544
Views
1
CrossRef citations to date
0
Altmetric
CRIMINOLOGY

Profiling terrorist organizations capable of high impact attacks

ORCID Icon, ORCID Icon, ORCID Icon &
Article: 2270642 | Received 28 Jul 2023, Accepted 10 Oct 2023, Published online: 26 Oct 2023

References

  • Abrahms, M., Beauchamp, N., & Mroszczyk, J. (2017). What terrorist leaders want: A content analysis of terrorist propaganda videos. Studies in Conflict & Terrorism, 40(11), 899–19. Scopus. https://doi.org/10.1080/1057610X.2016.1248666
  • Abrahms, M., & Gottfried, M. S. (2016). Does Terrorism pay? An empirical analysis. Terrorism and Political Violence, 28(1), 72–89. Scopus. https://doi.org/10.1080/09546553.2013.879057
  • Arthur, D., & Vassilvitskii, S. (2007). K-Means++: The advantages of careful seeding. Proceedings of the Eighteenth Annual ACM-SIAM Symposium on Discrete Algorithms, New Orleans, Louisiana (pp. 1027–1035).
  • Asal, V., & Rethemeyer, R. K. (2008). The nature of the beast: Organizational structures and the lethality of terrorist attacks. The Journal of Politics, 70(2), 437–449. https://doi.org/10.1017/S0022381608080419
  • Blázquez-García, A., Conde, A., Mori, U., & Lozano, J. A. (2020). A review on outlier/anomaly detection in time series data. https://doi.org/10.48550/arXiv.2002.04236
  • Blomberg, S. B., Gaibulloev, K., & Sandler, T. (2011). Terrorist group survival: Ideology, tactics, and base of operations. Public Choice, 149(3–4), 441–463. https://doi.org/10.1007/s11127-011-9837-4
  • Drake, C. J. M. (1998). The role of ideology in terrorists’ target selection. Terrorism and Political Violence, 10(2), 53–85. https://doi.org/10.1080/09546559808427457
  • Ellis, J. O. (2004). MIPT: Sharing Terrorism information resources. In H. Chen, R. Moore, D. D. Zeng, & J. Leavitt (Eds.), Intelligence and security informatics (Vol. 3073, pp. 520–525). Springer. https://doi.org/10.1007/978-3-540-25952-7_48
  • Forest, J. J. F. (2012). Kidnapping by terrorist groups, 1970-2010: Is ideological orientation relevant? Crime & Delinquency, 58(5), 769–797. https://doi.org/10.1177/0011128712452962
  • Ganor, B. (2008). Terrorist organization typologies and the probability of a boomerang effect. Studies in Conflict & Terrorism, 31(4), 269–283. https://doi.org/10.1080/10576100801925208
  • General Assembly, U. N. (2021, January 29). United Nations general Assembly resolution 75/729. United Nations Documents. https://documents-dds-ny.un.org/doc/UNDOC/GEN/N21/024/00/PDF/N2102400.pdf?OpenElement
  • Hoffman, B. (2006). Inside terrorism (Rev. and expanded, ed.). Columbia University Press.
  • Hyslop, D., & Morgan, T. (2014). Measuring terrorism with the global terrorism index. In Contributions to conflict management, peace economics and development (Vol. 22, pp. 97–114). Emerald Group Publishing. https://doi.org/10.1108/S1572-8323(2014)0000022010
  • Jenkins, J. P. (2020, July). Terrorism | definition, history, & facts | britannica. https://www.britannica.com/topic/terrorism
  • Jin, X., & Han, J. (2010). K-Means clustering. In C. Sammut & G. I. Webb (Eds.), Encyclopedia of machine learning (pp. 563–564). Springer US. https://doi.org/10.1007/978-0-387-30164-8_425
  • LaFree, G., & Dugan, L. (2007). Introducing the global terrorism database. Terrorism and Political Violence, 19(2), 181–204. https://doi.org/10.1080/09546550701246817
  • Merari, A. (1978). A classification of terrorist groups. Terrorism, 1(3–4), 331–346. https://doi.org/10.1080/10576107808435418
  • Mickolus, E. F., Sandler, T., Murdock, J. M., & Flemming, P. A. (2016). International terrorism: Attributes of terrorist events (ITERATE), 1968-2010 [dataset]. Harvard Dataverse. https://doi.org/10.7910/DVN/UU6CHA
  • Mroszczyk, J. (2019). To die or to kill? An analysis of suicide attack lethality. Terrorism and Political Violence, 31(2), 346–366. https://doi.org/10.1080/09546553.2016.1228632
  • Onat, I., & Gul, Z. (2018). Terrorism risk forecasting by ideology. European Journal on Criminal Policy and Research, 24(4), 433–449. https://doi.org/10.1007/s10610-017-9368-8
  • Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., Vanderplas, J., Passos, A., Cournapeau, D., Brucher, M., Perrot, M., & Duchesnay, É. (2011). Scikit-learn: Machine learning in python. Journal of Machine Learning Research, 12(85), 2825–2830.
  • Romano, D., Rowe, S., Phelps, R., & Simons, G. (2019). Correlates of terror: Trends in types of terrorist groups and fatalities inflicted. Cogent Social Sciences, 5(1), 1584957. https://doi.org/10.1080/23311886.2019.1584957
  • Shultz, R. (1978). Conceptualizing Political Terrorism: A typology. Journal of International Affairs, 32(1), 7–15.
  • Singh, P. P., & Philip, D. (2021). Iterative outlier analysis heuristic to study high impact terror attacks of the MENA region and Europe. WIT Transactions on the Built Environment, 206, 93–103. Scopus. https://doi.org/10.2495/SAFE210081
  • Singh, P. P., & Philip, D. (2022). Extraction and analysis of high impact attacks for insights in global terrorism. Global Business Review. https://doi.org/10.1177/09721509221129038
  • Singh, P. P., & Philip, D. (2023). Modelling & analysis of high impact terrorist attacks in India & its neighbors. ISPRS International Journal of Geo-Information, 12(4), 162. Article 4. https://doi.org/10.3390/ijgi12040162
  • Skillings, J. H., & Mack, G. A. (1981). On the use of a Friedman-type statistic in balanced and unbalanced block designs. Technometrics, 23(2), 171–177. https://doi.org/10.1080/00401706.1981.10486261
  • Srisuradetchai, P. (2015). Skillings.Mack: The Skillings-Mack test statistic for block designs with missing observations (1.10) [Computer software]. https://CRAN.R-project.org/package=Skillings.Mack
  • START (National Consortium for the Study of Terrorism and Responses to Terrorism). (2018). Global terrorism database 2018 codebook. https://www.start.umd.edu/gtd/downloads/Codebook.pdf
  • Syakur, M. A., Khotimah, B. K., Rochman, E. M. S., & Satoto, B. D. (2018). Integration K-Means clustering method and elbow method for identification of the best customer profile cluster. IOP Conference Series: Materials Science & Engineering, 336, 012017. https://doi.org/10.1088/1757-899X/336/1/012017
  • Taskesen, E. (2020, January). Distfit—probability density fitting. Probability Density Fitting. (Original work published 2020), https://github.com/erdogant/distfit
  • Victoroff, J. (2005). The mind of the terrorist: A review and critique of psychological approaches. Journal of Conflict Resolution, 49(1), 3–42. https://doi.org/10.1177/0022002704272040
  • Virtanen, P., Gommers, R., Oliphant, T. E., Haberland, M., Reddy, T., Cournapeau, D., Burovski, E., Peterson, P., Weckesser, W., Bright, J., van der Walt, S. J., Brett, M., Wilson, J., Millman, K. J., Mayorov, N., Nelson, A. R. J., Jones, E., Kern, R., Larson, E., … van Mulbregt, P. (2020). SciPy 1.0: Fundamental algorithms for scientific computing in Python. Nature Methods, 17(3), 261–272. https://doi.org/10.1038/s41592-019-0686-2