Knowledge Extraction on the Nexus Between Terrorism Criteria and Attacks on Private Citizens and Property

D. Atsa’am, R. Wario
{"title":"Knowledge Extraction on the Nexus Between Terrorism Criteria and Attacks on Private Citizens and Property","authors":"D. Atsa’am, R. Wario","doi":"10.4018/IJCWT.2021010102","DOIUrl":null,"url":null,"abstract":"This study extracted knowledge on the association between terrorism inclusion criteria and one of the terrorism target/victim types known as “private citizens and property.” Three criteria determine what constitutes a terror attack: Criterion 1: the action is done with intention to attain a political, economic, religious, or social goal; Criterion 2: the action is done with the intention to coerce, intimidate or publicize to larger audience(s); Criterion 3: the action is outside international humanitarian law. Literally, all terror incidents satify Criterion 3. As for Criteria 1 and 2, the odds ratio was deployed on the global terrorism database, consisting of 170,350 records of terrorist attack incidents, to evaluate the nexus between each of these criteria and terror attacks on private citizens and property. The results showed that any terror attack on private citizens and property is 2.2 times more likely to have been perpetrated by a terror group in order to achieve Criterion 2 than to achieve Criterion 1. The implications of the outcome in counterterrorism are discussed.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"20 7 1","pages":"20-30"},"PeriodicalIF":0.2000,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Cyber Warfare and Terrorism","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/IJCWT.2021010102","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"POLITICAL SCIENCE","Score":null,"Total":0}
引用次数: 1

Abstract

This study extracted knowledge on the association between terrorism inclusion criteria and one of the terrorism target/victim types known as “private citizens and property.” Three criteria determine what constitutes a terror attack: Criterion 1: the action is done with intention to attain a political, economic, religious, or social goal; Criterion 2: the action is done with the intention to coerce, intimidate or publicize to larger audience(s); Criterion 3: the action is outside international humanitarian law. Literally, all terror incidents satify Criterion 3. As for Criteria 1 and 2, the odds ratio was deployed on the global terrorism database, consisting of 170,350 records of terrorist attack incidents, to evaluate the nexus between each of these criteria and terror attacks on private citizens and property. The results showed that any terror attack on private citizens and property is 2.2 times more likely to have been perpetrated by a terror group in order to achieve Criterion 2 than to achieve Criterion 1. The implications of the outcome in counterterrorism are discussed.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
恐怖主义标准与对公民私人财产的袭击之间关系的知识提取
这项研究提取了有关恐怖主义纳入标准与恐怖主义目标/受害者类型之一(称为“私人公民和财产”)之间关系的知识。恐怖袭击的构成有三个标准:标准1:行动的目的是达到政治、经济、宗教或社会目标;标准2:该行为具有强迫、恐吓或向更多受众宣传的意图;标准3:行动不符合国际人道主义法。从字面上看,所有恐怖事件都符合标准3。关于标准1和标准2,在全球恐怖主义数据库(包括170350起恐怖袭击事件的记录)中使用了比值比,以评价每项标准与对普通公民和财产的恐怖袭击之间的联系。结果显示,任何针对普通公民和财产的恐怖袭击是由恐怖组织实施的,以达到标准2的可能性是达到标准1的2.2倍。讨论了结果在反恐中的含义。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
1.80
自引率
40.00%
发文量
20
期刊最新文献
Meta-Analysis and the Integration of Terrorism Event Databases Modeling and Simulating Student Protests Through Agent-Based Framework Artificial Intelligence and Facial Recognition in an IoT Ecosystem IoT and Edge Computing as Enabling Technologies of Human Factors Monitoring in CBRN Environment Integrated Information Model of an Enterprise and Cybersecurity Management System: From Data to Activity
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1