Skip to main content

Advertisement

Log in

Terrorism Risk, Resilience and Volatility: A Comparison of Terrorism Patterns in Three Southeast Asian Countries

  • Original Paper
  • Published:
Journal of Quantitative Criminology Aims and scope Submit manuscript

Abstract

Objective

This article explores patterns of terrorist activity over the period from 2000 through 2010 across three target countries: Indonesia, the Philippines and Thailand.

Methods

We use self-exciting point process models to create interpretable and replicable metrics for three key terrorism concepts: risk, resilience and volatility, as defined in the context of terrorist activity.

Results

Analysis of the data shows significant and important differences in the risk, volatility and resilience metrics over time across the three countries. For the three countries analysed, we show that risk varied on a scale from 0.005 to 1.61 “expected terrorist attacks per day”, volatility ranged from 0.820 to 0.994 “additional attacks caused by each attack”, and resilience, as measured by the number of days until risk subsides to a pre-attack level, ranged from 19 to 39 days. We find that of the three countries, Indonesia had the lowest average risk and volatility, and the highest level of resilience, indicative of the relatively sporadic nature of terrorist activity in Indonesia. The high terrorism risk and low resilience in the Philippines was a function of the more intense, less clustered pattern of terrorism than what was evident in Indonesia.

Conclusions

Mathematical models hold great promise for creating replicable, reliable and interpretable “metrics” to key terrorism concepts such as risk, resilience and volatility.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Notes

  1. In this instance, we define Indonesia as including East Timor.

  2. The shifting is necessary so no mass is given to 0. The shifted decay function g(u) has the same value as a negative binomial pmf at u − 1. Zero-truncated distributions are another suitable option for the decay function.

  3. In addition, Table 2 in Porter and White (2012) shows that letting μ vary over time has little effect on the estimates of the self-exciting component parameters. This is intuitive considering the relative small magnitude of μ as compared to λ(t). In order for variations in μ to significantly alter the values of the self-exciting component parameters B(t) would have to be a function that closely replicated the fitting capabilities of the self-exciting component. Thus, as B(t) approaches the self-exciting component, the self-exciting component becomes redundant, and the issues of identifiability and inestimability become evident.

  4. An example of this is shown in Fig. 2b.

  5. Defining T as the total number of days in the period of analysis (2000–2010), from (4) the log-likelihood is \(\log(L)=T[\theta\log(\theta)-\log(\Upgamma(\theta))]+ \sum_{t=1}^T\log(\Upgamma(\theta)+y_t)-\log(y_t!)-(\theta+y_t)\log(\lambda(t)+\theta) +y_t\log(\lambda(t)).\)

References

  • Abuza Z (2010) Indonesian counter-terrorism: the Great Leap forward. Terror Monit 8(2):6–8

    Google Scholar 

  • Ahmed S, Farooq O (2008) The effect of 9/11 on the stock market volatility dynamics: empirical evidence from a front line state. Int Res J Financ Econ 16:71–83

    Google Scholar 

  • Arin KP, Ciferri D, Sagnolo N (2008) The price of terror: the effects of terrorism on stock market returns and volatility. Econ Lett 101:164–167

    Article  Google Scholar 

  • Ascher W, Tarrow S (1975) The stability of communist electorates: evidence from a longitudinal analysis of French and Italian aggregate data. Am J Political Sci 19:475–499

    Article  Google Scholar 

  • Bandura A (1990) Mechanisms of moral disengagement. In: Reich W (ed) Origins of terrorism: psychologies, ideologies, theologies, states of mind. Cambridge University Press, Cambridge, pp 161–191

    Google Scholar 

  • Banlaoi RC (2007) Radical muslim terrorism in the Philippines. In: Tan ATH (ed) A handbook of terrorism and insurgency in Southeast Asia. Edward Elgar, Cheltenham

    Google Scholar 

  • Behlendorf B, LaFree G, Legault R (2012) Microcycles of violence: evidence from terrorist attacks by ETA and FMLN. J Quant Criminol 28:49–75

    Article  Google Scholar 

  • Berrebi C, Klor EF (2008) Are voters sensitive to terrorism? Direct evidence from the Israeli electorate. Am Political Sci Rev 102(3):279–301

    Article  Google Scholar 

  • Berrebi C, Lakdawalla D (2007) How does terrorism risk vary across space and time? An analysis based of the Israeli experience. Def Peace Econ 18:113–131

    Article  Google Scholar 

  • Bodwin P, Wiman B (2004) Resilience and other stability concepts in ecology: notes on their origin, validity and usefulness. ESS Bull 2:33–43

    Google Scholar 

  • Bonanno G (2004) Loss, trauma, and human resilience: have we underestimated the human capacity to thrive after extremely aversive events? Am Psychol 59:20–28

    Article  Google Scholar 

  • Braithwaite A, Johnson S (2012) Space-time modeling of insurgency and counterinsurgency in Iraq. J Quant Criminol 28:31–48. http://dx.doi.org/10.1007/s10940-011-9152-8

    Google Scholar 

  • Brown D, Kulig J (1996/1997) The concept of resiliency: theoretical lessons from community research. Health Can Soc 4:29–52

    Google Scholar 

  • Brunschot EGV, Kennedy LW (2008) Risk, balance and security. Sage, New York

    Google Scholar 

  • Butler L, Morland L, Leskin G (2007) Psychological resilience in the face of terrorism. In: Bongar B, Brown L, Beutler L, Breckenridge J, Zimbardo P (eds) Psychology of terrorism. Oxford University Press, Oxford, pp 400–417

    Google Scholar 

  • Casella G, Berger R (2001) Statistical inference, 2nd edn. Duxbury, North Scituate

    Google Scholar 

  • Chalk P (2008) The malay-muslim insurgency in Southern Thailand: understanding the conflict’s evolving dynamics. Tech. rep., The RAND Corporation

  • Chalk P (2010) Personal communication

  • Chongkittavorn K (2004) Thailand: international terrorism and the muslim South. Southeast Asian Aff 32:267–275

    Article  Google Scholar 

  • Christensen R (2002) Plane answers to complex questions: the theory of linear models, 3rd edn. Springer, New York

    Book  Google Scholar 

  • Clarke R, Newman G (2006) Outsmarting the terrorists. Praeger, Westport

    Google Scholar 

  • Clauset A, Gleditsch KS (2011) The developmental dynamics of terrorist organizations. ArXiv e-prints 0906.3287v2

  • Clauset A, Young M, Gleditsch KS (2007) On the frequency of severe terrorist events. J Confl Resolut 51(1):58–87

    Article  Google Scholar 

  • Collier K (2006) Terrorism: evolving regional alliances and state failure in Mindanao. Southeast Asian Aff 2006:26–38

  • Corsi JR (1981) Terrorism as a desperate game. J Confl Resolut 25(1):47–85

    Article  Google Scholar 

  • Craigin K (2007) Sharing the dragon’s teeth: terrorist groups and the exchange of new technologies. Tech. rep., RAND Corporation, Santa Monica, CA

  • Crenshaw M (1986) Political psychology: contemporary problems and issues. Jossey-Bass, chap The Psychology of Political Terrorism, pp 379–413. Reprinted in Jost JT, Sidanius J (eds) Political psychology: key readings (Taylor and Francis, 2004)

  • Croissant A (2005) Unrest in Thailand: contours, causes and consequences since 2001. Strateg Insights 4(2):21–41, online Journal

    Google Scholar 

  • Crotty WJ (2005) Democratic development and political terrorism: the global perspective. Northeastern University Press, Boston

    Google Scholar 

  • Daley DJ, Vere-Jones D (2003) An introduction to the theory of point processes, vol I, 2nd edn. Springer, New York

    Google Scholar 

  • Diggle P (1985) A kernel method for smoothing point process data. J R Stat Soc Ser C Appl Stat 34(2):138–147

    Google Scholar 

  • Dugan L (2011) The series hazard model: an alternative to time series for event data. J Quant Criminol 27:379–402

    Article  Google Scholar 

  • Dugan L, LaFree G, Piquero A (2005) Testing a rational choice model of airline hijackings. Criminology 43(43):1031–1066

    Article  Google Scholar 

  • Egesdal M, Fathauer C, Louie K, Neuman J (2010) Statistical and stochastic modeling of gang rivalries in Los Angles. SIAM Undergraduate Research Online 3

  • Enders W (2007) Handbook of defense economics, vol 2, Elsevier, Amsterdam, The Netherlands, chap Terrorism: An Empirical Analysis, pp 815–866

  • Enders W, Sandler T (1999) Transnational terrorism in the post-Cold War Era. Int Stud Q 43(1):145–167

    Article  Google Scholar 

  • Enders W, Sandler T (2004) Transnational terrorism 1968–2000: thresholds, persistence and forecasts. South Econ J 71(3):467–482

    Article  Google Scholar 

  • Enders W, Parise GF, Sandler T (1992) A time-series analysis of transnational terrorism: trends and cycles. Def Peace Econ 3(2):305–320

    Google Scholar 

  • Ezell BC, Bennett SP, von Winterfeldt D, Sokolowski J, Collins AJ (2010) Probabilistic risk analysis and terrorism risk. Risk Anal 30(4):575–589

    Article  Google Scholar 

  • Franklin GF, Powel JD, Emami-Naeini A (1994) Feedback control of dynamic systems, 3rd edn. Addison-Wesley, Reading

    Google Scholar 

  • Gordon J (1978) Structures. Penguin Books, Harmondsworth

    Google Scholar 

  • Gould MS, Wallenstein S, Kleinman M (1990) Time-space clustering of teenage suicide. Am J Epidemiol 131(1):71–78

    Google Scholar 

  • Hawkes AG (1971) Spectra of some self-exciting and mutually exciting point processes. Biometrika 58(1):83–90

    Article  Google Scholar 

  • Hawkes AG, Oakes D (1974) A cluster process representation of a self-exciting process. J Appl Probab 11(3):493–503, http://www.jstor.org/stable/3212693

    Google Scholar 

  • Hedman ELE (2006) The Philippines in 2005: old dynamics, new conjuncture. Asian Survey 46(1):187–193

    Article  Google Scholar 

  • Holden R (1986) The contagiousness of aircraft hijacking. Am J Sociol 91(91):874–904

    Article  Google Scholar 

  • Holden R (1987) Time series analysis of a contagious process. J Am Stat Assoc 82(400):1019–1026

    Article  Google Scholar 

  • Hutchinson MC (1972) The concept of revolutionary terrorism. J Confl Resolut 16(3):383–396

    Google Scholar 

  • ICG (2002) Indonesia backgrounder: how the Jemaah Islamiyah terrorist network operates. Tech. Rep. 43, International Crisis Group

  • Im EI, Cauley J, Sandler T (1987) Cycles and substitutions in terrorist activities: a spectral approach. Kyklos 40(2):238–255

    Article  Google Scholar 

  • Jackson BA, Baker J, Cragin K, Parachini J, Trujillo HR, Chalk P (2005) Aptitude for destruction volume 2: case studies of organizational learning in five terrorist groups. Tech. rep., Rand Corporation, Santa Monica CA

  • Jenkins-Smith HC, Herron KG (2005) United States public response to terrorism: fault lines or bedrock? Rev Policy Res 22:599–623

    Article  Google Scholar 

  • Johnson S (2008) Repeat burglary victimisation: a tale of two theories. J Exp Criminol 4(3):215–240

    Article  Google Scholar 

  • Johnson S, Summers L, Pease K (2009) Offender as forager? A direct test of the boost account of victimization. J Quant Criminol 25(2):181–200

    Article  Google Scholar 

  • Johnson SD, Bernasco W, Bowers KJ, Elffers H, Ratcliffe J, Rengert G, Townsley M (2007) Space-time patterns of risk: a cross national assessment of residential Burglary victimization. J Quant Criminol 23:201–219

    Article  Google Scholar 

  • Jones S (2008) Briefing for the new president: the terrorist threat in Indonesia and South-east Asia. Ann Am Acad Political Soc Sci 618:69–78

    Article  Google Scholar 

  • Kimhi S, Shamai M (2004) Community resilience and the impact of stress: adult response to Israel’s withdraw from Lebanon. J Community Psychol 32:439–451

    Article  Google Scholar 

  • Labrador MC (2002) The Philippines in 2000: In search of a Silver Lining. Asian Stud 41(1):221–229

    Google Scholar 

  • LaFree G, Dugan L (2007) Introducing the global terrorism database. Terror Political Violence 19:181–204

    Article  Google Scholar 

  • LaFree G, Dugan L, Korte R (2009) The impact of British counter terrorist strategies on political violence in Northern Ireland: comparing deterrence and Backlash models. Criminology 47:17–45

    Article  Google Scholar 

  • LaFree G, Mazerolle L, Denning R, Miller E, White G, Yang SM (2011) Modeling the effectiveness of counter-terrorism strategies in Indonesia, the Philippines and Thailand. Research report, The National Consortium for the study of terrorism and responses to terrorism and The Australian Research Council Centre of Excellence in Policing and Security, US Department of Homeland Security Grant Award 2009-ST-108-000008 and the Australian Department of Prime Minister and Cabinet Grant Award PR09-0007

  • Lewis E, Mohler G, Brantingham PJ, Bertozzi AL (2011) Self-exciting point process models of civilian deaths in Iraq. Secur J. http://dx.doi.org/10.1057/sj.2011.21. Advance online publication 19 September

  • Li RP, Thompson WR (1975) The “Coup Contagion” hypothesis. J Confl Resolut 19:63–88

    Article  Google Scholar 

  • Liow JC (2006) Muslim resistance in Souther Thailand and Southern Philippines: religion, ideology and politics. Policy Studies 24, East-West Center, Washington DC, USA

  • Magnus JR, Neudecker H (1999) Matrix differential calculus with applications in statistics and econometrics. Wiley, New York

    Google Scholar 

  • Mannan S (2005) Lees’ loss prevention in the process industries, 3rd edn. Butterworth-Heinemann, Oxford

    Google Scholar 

  • Markowitz H (1952) Portfolio selection. J Finanac 7(1):77–91

    Google Scholar 

  • May PJ, Sapotichne J, Workman S (2009) Widespread policy disruption: terrorism, public risks, and homeland security. Policy Stud J 37:171–194

    Article  Google Scholar 

  • Meyer S, Elias J, Höhle M (2011) A space-time conditional intensity model for invasive meningococcal disease occurrence. Biometrics doi:10.1111/j.1541-0420.2011.01684.x

  • Midlarsky MI (1978) Analyzing diffusion and contagion effects: the urban disorders of the 1960s. Am Political Sci Rev 72:996–1008

    Article  Google Scholar 

  • Midlarsky MI, Crenshaw M, Yoshida F (1980) Why Violence spreads: the contagion of international terrorism. Int Stud Q 24:341–365

    Google Scholar 

  • Mohler GO, Short MB, Brantingham PJ, Schoenberg FP, Tita GE (2011) Self-exciting point process modeling of crime. J Am Stat Assoc 106(493):100–108

    Article  Google Scholar 

  • Mueller J, Stewart MG (2011) Terror, security, and money balancing the risks, benefits, and costs of homeland security. Oxford University Press, Oxford

    Google Scholar 

  • Myers DJ (2000) The diffusion of collective violence: infectiousness, susceptibility, and mass media networks. Am J Sociol 106(1):178–208

    Article  Google Scholar 

  • Norris FH, Stevens SP, Pfefferbaum B, Wyche KF, Pfefferbaum RL (2008) Community resilience as a metaphor, theory, set of capacities, and strategy for disaster readiness. Am J Community Psychol 41:127–150

    Article  Google Scholar 

  • Ogata Y (1988) Statistical models for earthquake occurrences and residual analysis for point processes J Am Stat Assoc 83(401):9–27. http://www.jstor.org/stable/2288914

    Google Scholar 

  • Ozaki T (1979) Maximum likelihood estimation of Hawkes’ self-exciting point processes. Ann Inst Stat Math 31:145–155

    Article  Google Scholar 

  • Perl R (2007) Combating terrorism: the challenge of measuring effectiveness. Report RL33160, Congressional Research Services

  • Pfefferbaum BJ, Reissman DB, Pfefferbaum RL, Klomp RW, Gurwitch RH (2007) Building resilience to mass trauma events. In: Doll LS, Bonzo SE, Sleet DA, Mercy JA (eds) Handbook of injury and violence prevention. Springer, New York, pp 347–358

    Chapter  Google Scholar 

  • Pierce GL, Spaar S, Briggs L (1988) The character of police work strategic and tactical implications. Tech. rep., Center for Applied Social Research, Boston, MA

  • Pizam A, Fleischer A (2002) Severity versus frequency of acts of terrorism: which has a larger impact on tourism demand? J Travel Res 40(3):337–339

    Article  Google Scholar 

  • Porter MD, White G (2012) Self-exciting hurdle models for terrorist activity. Ann Appl Stat 6(1):106–124

    Article  Google Scholar 

  • Porter MD, White G, Mazerolle LM (2012) Evidence-based counterterrorism policy. Springer, New York, NY, chap Innovative methods for terrorism and counterterrorism data, pp 91–112

  • Price JC, Forrest JS (2009) Practical aviation security: predicting and preventing future threats. Butterworth-Heinemann, Oxford

    Google Scholar 

  • R Development Core Team (2011) R: A language and environment for statistical computing. R Foundation for Statistical Computing, Vienna, Austria. http://www.R-project.org, ISBN 3-900051-07-0

  • Rahimmula C (2004) Peace resolution: a case study of separatist and terrorist movement in Southern border provinces of Thailand. Songklanakarin J Soc Sci Humanit 10(1):97–112

    Google Scholar 

  • Ratcliffe J, Rengert G (2008) Near-repeat patterns in Philadelphia shootings. Secur J 21(1):58–76

    Article  Google Scholar 

  • Renò R, Rizza R (2003) Is volatility lognormal? Evidence from Italian futures. Phys A 332:620–628

    Google Scholar 

  • Rose A, Liao SY (2005) Modeling regional economic resilience to disasters: a computable general equilibrium analysis of water service disruptions. J Reg Sci 45(1):75–112

    Article  Google Scholar 

  • Ross ML (2005) Rebellion and resources in Aceh, Indonesia. In: Collier P, Sambanis N (eds) Understanding civil war: evidence and analysis, vol 2, The World Bank

  • Rutter M (1993) Resilience: some conceptual considerations. J Adolesc Health 14:626–631

    Article  Google Scholar 

  • Sarewitz D, Pielke R, Keykhah M (2003) Vulnerability and risk: some thoughts from a political and policy perspective. Risk Anal 23(4):805–810. doi:10.1111/1539-6924.00357

    Article  Google Scholar 

  • Schrodt PA, Gerner DJ (1996) Using cluster analysis to derive early warning indicators for the middle east, 1976–1979, paper presented at the American Political Science Association, San Francisco, 28 August–1 September 1996

  • Schrodt PA, Gerner DJ (2000) Cluster-based early warning indicators for political change in contemporary levant. Am Political Sci Rev 94(4):803–817

    Article  Google Scholar 

  • Shapiro JN, Cohen DK (2007) Color bind: lessons from the failed homeland security advisory system. Int Secur 32(2):121–154. doi:10.1162/isec.2007.32.2.121

    Article  Google Scholar 

  • Sherman L, Gartin P, Buerger M (1989) Hot spots of predatory crime: routine activities and the criminology of place. Criminology 27:27–56

    Article  Google Scholar 

  • Short MB, D’Orsogna MR, Brantingham PJ, Tita GE (2009) Measuring and modeling repeat and near-repeat burglary effects. J Quant Criminol 3:335–339

    Google Scholar 

  • Sonn C, Fisher A (1998) A sense of community: community resilient response to oppression and change. J Community Psychol 26:457–472

    Article  Google Scholar 

  • Spelman W (1993) Abandoned buildings: magnets for crime? J Crim Justice 21:481–495

    Article  Google Scholar 

  • Stomakhin A, Short MB, Bertozzi AL (2011) Reconstruction of missing data in social networks based on temporal patterns of interactions. Inverse Probl 27(11). http://stacks.iop.org/0266-5611/27/i=11/a=115013

  • Sunstein CR (2003) Terrorism and probability neglect. J Risk Uncertain 26:2/3 121-136 2003 26:121–136

    Google Scholar 

  • Taylor S (2005) Asset price dynamics, volatility, and prediction. Springer, New York

    Google Scholar 

  • Telesca L, Lovallo M (2006) Are global terrorism attacks time-correlated? Phys A 362:480–484

    Article  Google Scholar 

  • Thornton TP (1964) Internal war, Free Press, New York, chap Terror as a weapon of political agitation, pp 71–99

  • Thywissen K (2006) Components of risk: a comparative glossary. SOURCE 2, United Nations University Institute for Environment and Human Security

  • Townsley M (2008) Visualising space time patterns in crime: the hotspot plot. Crime Patterns Anal 1:61–74

    Google Scholar 

  • Townsley M, Johnson SD, Ratcliffe JH (2008) Space time dynamics of insurgent activity in Iraq. Secur J 21:139–146

    Article  Google Scholar 

  • van Biezen I (2005) Terrorism and democratic legitimacy: conflicting interpretations of the Spanish elections. Mediterr Politics 10:99–108

    Article  Google Scholar 

  • Vedenov DV, Duffield JA, Wetzstein ME (2006) Entry of alternative fuels in a volatile US gasoline market. J Agric Resour Econ 31:1–13

    Google Scholar 

  • Veen A, Schoenberg F (2008) Estimation of space-time branching process models in seismology using an EM-type algorithm. J Am Stat Assoc 103(482):614–624

    Article  Google Scholar 

  • Wang Q, Schoenberg FP, Jackson DD (2010) Standard errors of parameter estimates in the ETAS model. Bull Seismol Soc Am 100(5A):1989–2001. doi:10.1785/0120100001, http://www.bssaonline.org/content/100/5A/1989.abstract, http://www.bssaonline.org/content/100/5A/1989.full.pdf+html

  • Wickes R, Zahnow R, Mazerolle L (2010) Community resilience: current approaches, challenges and opportunities. In: Mendis P, Yates A (eds) Recent advantages in national security technology and research, research network for a secure Australia, Australian security research centre

  • Willis HH, Morral AR, Kelly TK, Medby JM (2005) Estimating terrorism risks. Tech. rep., RAND Corporation

  • Yuen KV (2010) Appendix A: Relationship between the Hessian and covariance matrix for Gaussian random variables, Wiley, New York, pp 257–262. doi:10.1002/9780470824566.app1

  • Zhuang J, Ogata Y, Vere-Jones D (2002) Stochastic declustering of space-time earthquake occurrences. J Am Stat Assoc 97(458):369–380

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gentry White.

Rights and permissions

Reprints and permissions

About this article

Cite this article

White, G., Porter, M.D. & Mazerolle, L. Terrorism Risk, Resilience and Volatility: A Comparison of Terrorism Patterns in Three Southeast Asian Countries. J Quant Criminol 29, 295–320 (2013). https://doi.org/10.1007/s10940-012-9181-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10940-012-9181-y

Keywords

Navigation