250
Views
2
CrossRef citations to date
0
Altmetric
Research Article

Why Do Terrorists Attack Other Terrorists? Knowledge Discovery from the Global Terrorism Database

ORCID Icon, ORCID Icon &
Pages 125-138 | Received 27 Sep 2020, Accepted 06 Jul 2021, Published online: 13 Jul 2021

References

  • Ahmed, R. (2018). Terrorist ideologies and target selection. Journal of Applied Security Research, 13(3), 376-390.
  • Alola, U. V., Alola, A. A., Avci, T., & Ozturen, A. (2019). Impact of corruption and insurgency on tourism performance: A case of a developing country. International Journal of Hospitality & Tourism Administration, 1–17. doi:10.1080/15256480.2019.1650686
  • Alola, U. V., & Atsa’am, D. D. (2020). Measuring employees’ psychological capital using data mining approach. Journal of Public Affairs, 20(2), e2050. doi:10.1002/pa.2050
  • Altier, M. B., Thoroughgood, C. N., & Horgan, J. G. (2014). Turning away from terrorism: Lessons from psychology, sociology, and criminology. Journal of Peace Research, 51(5), 647–661. doi:10.1177/0022343314535946
  • Altman, D. G., & Bland, J. M. (2011). How to obtain p value from a confidence interval. BMJ, 343, d2304. doi:10.1136/bmj.d2304
  • Andrade, C. (2015). Understanding relative risk, odds ratio, and related terms: As simple as it can get. The Journal ofClinical Psychiatry, 76(7), 857–861. doi:10.4088/JCP.15f10150
  • Atsa’am, D. D. (2020). Feature selection algorithm using relative odds for data mining classification. In A. Haldorai & A. Ramu (Eds.), Big data analytics for sustainable computing (pp. 81–106). Hersey, P.A: IGI Global. doi:10.4018/978-1-5225-9750-6.ch005
  • Atsa’am, D. D., & Bodur, E. K. (2020). Knowledge mining on the association between psychological capital and educational qualifications among hospitality employees. Current Issues in Tourism, 23(9), 1073–1077. doi:10.1080/13683500.2019.1597026
  • Atsa’am, D. D., & Wario, R. (2021a). Knowledge extraction on the nexus between terrorism criteria and attacks on private citizens and property. International Journal of Cyber Warfare and Terrorism, 11(1), 20–30. doi:10.4018/IJCWT.2021010102
  • Atsa’am, D. D., & Wario, R. (2021b). Adopting the divide-and-conquer strategy for use of terrorists in counterterrorism through the stag hunt game-theoretic environment. Journal of Applied Security Research, 1–9. doi:10.1080/19361610.2021.1908814
  • Atsa’am, D. D., Wario, R., & Okpo, F. E. (2020a). A new terrorism categorization based on casualties and consequences using hierarchical clustering. Journal of Applied Security Research, 15(3), 369–384. doi:10.1080/19361610.2020.1769461
  • Atsa’am, D. D., Wario, R., & Okpo, F. E. (2020b). TerrorClassify: An algorithm for terror groups placement into hierarchical categories of casualties and consequences. Journal of Applied Security Research, 15(4), 568–579. doi:10.1080/19361610.2020.1812475
  • Blomberg, S. B., Gaibulloev, K., & Sandler, T. (2011). Terrorist group survival: Ideology, tactics, and base of operations. Public Choice, 149(3–4), 441. doi:10.1007/s11127-011-9837-4
  • Bodur, E. K., & Atsa’am, D. D. (2019). Filter variable selection algorithm using risk ratios for dimensionality reduction of healthcare data for classification. Processes, 7(4), 222. doi:10.3390/pr7040222
  • Bush, K. (2003). The intra-group dimensions of ethnic conflict in Sri Lanka: Learning to read between the lines. London: Palgrave Macmillan.
  • Carter, B., & Ahmed, R. (2019). The strategic logic of environmental terrorism: Linking terrorist ideology to credit claiming behavior. Journal of Applied Security Research, 15(1), 28-48. doi:10.1080/19361610.2019.1673088
  • Copeland, T. (2001). Is the” New Terrorism” Really New?: An analysis of the new paradigm for terrorism. Journal of Conflict Studies, 21(2), 7-27.
  • Davis, J. (2013). Evolution of the global Jihad: Female suicide bombers in Iraq. Studies in Conflict & Terrorism,36(4), 279–291.
  • Enders, W., Sandler, T., & Gaibulloev, K. (2011). Domestic versus transnational terrorism: Data, decomposition, and dynamics. Journal of Peace Research, 48(3), 319–337. doi:10.1177/0022343311398926
  • Fosl, P. S. (2013). Anarchism and authenticity, or why SAMCRO shouldn’t fight history. In G. A. Dunn, & J. T. Eberl (Eds.) Sons of Anarchy and Philosophy: Brains before Bullets (pp. 201–213). Chichester: John Wiley & Sons. doi:10.1002/9781118641712.ch18
  • Hassan, M. H. B. (2006). Key considerations in counterideological work against terrorist ideology. Studies in Conflict & Terrorism, 29(6), 531–558. doi:10.1080/10576100600791058
  • Hoffman, B. (2006). Defining terrorism. In Inside terrorism (pp. 1–42). New York: Columbia University Press.
  • Jones, J. (2008). Blood that cries out from the earth: The psychology of religious terrorism. New York, NY: Oxford University Press.
  • Last, A., & Wilson, S. (2004). Relative risks and odds ratios: What’s the difference? The Journal of Family Practice, 53, 108.
  • Martin, G. (2017). Understanding terrorism: Challenges, perspectives, and issues. Thousand Oaks, California: SAGE publications.
  • McNutt, L., Wu, C., Xue, X., & Hafner, J. P. (2003). Estimating the relative risk in cohort studies and clinical trials of common outcomes. American Journal of Epidemiology, 157(10), 940–943. doi:10.1093/aje/kwg074
  • MedCal Software Ltd. (2020, February 8). Relative risk, risk difference and odds ratio. Retrieved from https://www.medcalc.org/manual/relativerisk_oddsratio.php
  • National Consortium for the Study of Terrorism and Responses to Terrorism (2019a, April 10). Global Terrorism Database. Retrieved from https://gtd.terrorismdata.com/files/gtd-1970-2018/
  • National Consortium for the Study of Terrorism and Responses to Terrorism. (2019b, April 10). Global terrorism database codebook. University of Maryland. Retrieved from https://www.start.umd.edu/gtd/
  • Oyelere, S. S., Atsa’am, D. D., Ayuba, H. M., Olawumi, O., Suhonen, J., & Joy, M. (2018). TerrorWatch: A prototype mobile app to combat terror in terror-prone nations. In F. J. Mtenzi (Ed.), Mobile technologies and socio-economic development in emerging nations (pp. 203–233). Hershey, PA: IGI Global. doi:10.4018/978-1-5225-4029-8.ch010
  • Pandis, N. (2012). Risk ratio vs odds ratio: Statistics and research design. Am. J. Orthod. Dentofac. Orthop</i>, 142(6), 890–891. doi:10.1016/j.ajodo.2012.08.003
  • Pellicani, L. (2003). Revolutionary apocalypse: Ideological roots of terrorism. Westport, CT: Praeger.
  • Phillips, B. J. (2019). Terrorist group rivalries and alliances: Testing competing explanations. Studies in Conflict & Terrorism,42(11), 997–1019. doi:10.1080/1057610X.2018.1431365
  • Postner, E. A., Spier, K., & Vermeule, A. (2010). Divide and conquer. Journal of Legal Analysis, 2(2), 417-471.
  • Roy, A. (2004). Peace & the new corporate liberation theology. The Centre for Peace and Conflict Studies, Mackie Building K01, University of Sydney NSW 2006
  • Saul, B. (2019). Defining terrorism: A conceptual minefield. In E. Chenoweth, R. English, A. Gofas, & S. N. Kalyvas (Eds.), The Oxford handbook of terrorism (pp. 34–49). Croydon, London: Oxford University Press.
  • Schmidt, C. O., & Kohlmann, T. (2008). When to use the odds ratio or the relative risk? International Journal of Public Health, 53(3), 165–167. doi:10.1007/s00038-008-7068-3
  • Schumacher, M. J., & Schraeder, P. J. (2019). The evolving impact of violent non-state actors on North African foreign policies during the Arab Spring: Insurgent groups, terrorists and foreign fighters. The Journal of North African Studies, 24(4), 682–703. doi:10.1080/13629387.2018.1525014
  • Sheehan, S. (2003). The cold war. Black Rabbit Books. Aurora, Illinois, United States.
  • Stern, J. (2003). Why religious militants kill: Terror in the name of God. New York, NY: Harper Collins Publishers.
  • Wilson, S. (2003, February 7). U.S. moves closer to Colombia’s war: Involvement of special forces could trigger new wave of guerrilla violence. Washington Post. Retrieved from http://www.latinamericanstudies.org/us-relations/saravena.htm
  • Young, J. K., & Dugan, L. (2010). Why do terrorist groups endure? Paper presented at the International Studies Association Meetings, New Orleans, LA.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.