Abstract
Objective
This article explores patterns of terrorist activity over the period from 2000 through 2010 across three target countries: Indonesia, the Philippines and Thailand.
Methods
We use self-exciting point process models to create interpretable and replicable metrics for three key terrorism concepts: risk, resilience and volatility, as defined in the context of terrorist activity.
Results
Analysis of the data shows significant and important differences in the risk, volatility and resilience metrics over time across the three countries. For the three countries analysed, we show that risk varied on a scale from 0.005 to 1.61 “expected terrorist attacks per day”, volatility ranged from 0.820 to 0.994 “additional attacks caused by each attack”, and resilience, as measured by the number of days until risk subsides to a pre-attack level, ranged from 19 to 39 days. We find that of the three countries, Indonesia had the lowest average risk and volatility, and the highest level of resilience, indicative of the relatively sporadic nature of terrorist activity in Indonesia. The high terrorism risk and low resilience in the Philippines was a function of the more intense, less clustered pattern of terrorism than what was evident in Indonesia.
Conclusions
Mathematical models hold great promise for creating replicable, reliable and interpretable “metrics” to key terrorism concepts such as risk, resilience and volatility.
Similar content being viewed by others
Notes
In this instance, we define Indonesia as including East Timor.
The shifting is necessary so no mass is given to 0. The shifted decay function g(u) has the same value as a negative binomial pmf at u − 1. Zero-truncated distributions are another suitable option for the decay function.
In addition, Table 2 in Porter and White (2012) shows that letting μ vary over time has little effect on the estimates of the self-exciting component parameters. This is intuitive considering the relative small magnitude of μ as compared to λ(t). In order for variations in μ to significantly alter the values of the self-exciting component parameters B(t) would have to be a function that closely replicated the fitting capabilities of the self-exciting component. Thus, as B(t) approaches the self-exciting component, the self-exciting component becomes redundant, and the issues of identifiability and inestimability become evident.
An example of this is shown in Fig. 2b.
Defining T as the total number of days in the period of analysis (2000–2010), from (4) the log-likelihood is \(\log(L)=T[\theta\log(\theta)-\log(\Upgamma(\theta))]+ \sum_{t=1}^T\log(\Upgamma(\theta)+y_t)-\log(y_t!)-(\theta+y_t)\log(\lambda(t)+\theta) +y_t\log(\lambda(t)).\)
References
Abuza Z (2010) Indonesian counter-terrorism: the Great Leap forward. Terror Monit 8(2):6–8
Ahmed S, Farooq O (2008) The effect of 9/11 on the stock market volatility dynamics: empirical evidence from a front line state. Int Res J Financ Econ 16:71–83
Arin KP, Ciferri D, Sagnolo N (2008) The price of terror: the effects of terrorism on stock market returns and volatility. Econ Lett 101:164–167
Ascher W, Tarrow S (1975) The stability of communist electorates: evidence from a longitudinal analysis of French and Italian aggregate data. Am J Political Sci 19:475–499
Bandura A (1990) Mechanisms of moral disengagement. In: Reich W (ed) Origins of terrorism: psychologies, ideologies, theologies, states of mind. Cambridge University Press, Cambridge, pp 161–191
Banlaoi RC (2007) Radical muslim terrorism in the Philippines. In: Tan ATH (ed) A handbook of terrorism and insurgency in Southeast Asia. Edward Elgar, Cheltenham
Behlendorf B, LaFree G, Legault R (2012) Microcycles of violence: evidence from terrorist attacks by ETA and FMLN. J Quant Criminol 28:49–75
Berrebi C, Klor EF (2008) Are voters sensitive to terrorism? Direct evidence from the Israeli electorate. Am Political Sci Rev 102(3):279–301
Berrebi C, Lakdawalla D (2007) How does terrorism risk vary across space and time? An analysis based of the Israeli experience. Def Peace Econ 18:113–131
Bodwin P, Wiman B (2004) Resilience and other stability concepts in ecology: notes on their origin, validity and usefulness. ESS Bull 2:33–43
Bonanno G (2004) Loss, trauma, and human resilience: have we underestimated the human capacity to thrive after extremely aversive events? Am Psychol 59:20–28
Braithwaite A, Johnson S (2012) Space-time modeling of insurgency and counterinsurgency in Iraq. J Quant Criminol 28:31–48. http://dx.doi.org/10.1007/s10940-011-9152-8
Brown D, Kulig J (1996/1997) The concept of resiliency: theoretical lessons from community research. Health Can Soc 4:29–52
Brunschot EGV, Kennedy LW (2008) Risk, balance and security. Sage, New York
Butler L, Morland L, Leskin G (2007) Psychological resilience in the face of terrorism. In: Bongar B, Brown L, Beutler L, Breckenridge J, Zimbardo P (eds) Psychology of terrorism. Oxford University Press, Oxford, pp 400–417
Casella G, Berger R (2001) Statistical inference, 2nd edn. Duxbury, North Scituate
Chalk P (2008) The malay-muslim insurgency in Southern Thailand: understanding the conflict’s evolving dynamics. Tech. rep., The RAND Corporation
Chalk P (2010) Personal communication
Chongkittavorn K (2004) Thailand: international terrorism and the muslim South. Southeast Asian Aff 32:267–275
Christensen R (2002) Plane answers to complex questions: the theory of linear models, 3rd edn. Springer, New York
Clarke R, Newman G (2006) Outsmarting the terrorists. Praeger, Westport
Clauset A, Gleditsch KS (2011) The developmental dynamics of terrorist organizations. ArXiv e-prints 0906.3287v2
Clauset A, Young M, Gleditsch KS (2007) On the frequency of severe terrorist events. J Confl Resolut 51(1):58–87
Collier K (2006) Terrorism: evolving regional alliances and state failure in Mindanao. Southeast Asian Aff 2006:26–38
Corsi JR (1981) Terrorism as a desperate game. J Confl Resolut 25(1):47–85
Craigin K (2007) Sharing the dragon’s teeth: terrorist groups and the exchange of new technologies. Tech. rep., RAND Corporation, Santa Monica, CA
Crenshaw M (1986) Political psychology: contemporary problems and issues. Jossey-Bass, chap The Psychology of Political Terrorism, pp 379–413. Reprinted in Jost JT, Sidanius J (eds) Political psychology: key readings (Taylor and Francis, 2004)
Croissant A (2005) Unrest in Thailand: contours, causes and consequences since 2001. Strateg Insights 4(2):21–41, online Journal
Crotty WJ (2005) Democratic development and political terrorism: the global perspective. Northeastern University Press, Boston
Daley DJ, Vere-Jones D (2003) An introduction to the theory of point processes, vol I, 2nd edn. Springer, New York
Diggle P (1985) A kernel method for smoothing point process data. J R Stat Soc Ser C Appl Stat 34(2):138–147
Dugan L (2011) The series hazard model: an alternative to time series for event data. J Quant Criminol 27:379–402
Dugan L, LaFree G, Piquero A (2005) Testing a rational choice model of airline hijackings. Criminology 43(43):1031–1066
Egesdal M, Fathauer C, Louie K, Neuman J (2010) Statistical and stochastic modeling of gang rivalries in Los Angles. SIAM Undergraduate Research Online 3
Enders W (2007) Handbook of defense economics, vol 2, Elsevier, Amsterdam, The Netherlands, chap Terrorism: An Empirical Analysis, pp 815–866
Enders W, Sandler T (1999) Transnational terrorism in the post-Cold War Era. Int Stud Q 43(1):145–167
Enders W, Sandler T (2004) Transnational terrorism 1968–2000: thresholds, persistence and forecasts. South Econ J 71(3):467–482
Enders W, Parise GF, Sandler T (1992) A time-series analysis of transnational terrorism: trends and cycles. Def Peace Econ 3(2):305–320
Ezell BC, Bennett SP, von Winterfeldt D, Sokolowski J, Collins AJ (2010) Probabilistic risk analysis and terrorism risk. Risk Anal 30(4):575–589
Franklin GF, Powel JD, Emami-Naeini A (1994) Feedback control of dynamic systems, 3rd edn. Addison-Wesley, Reading
Gordon J (1978) Structures. Penguin Books, Harmondsworth
Gould MS, Wallenstein S, Kleinman M (1990) Time-space clustering of teenage suicide. Am J Epidemiol 131(1):71–78
Hawkes AG (1971) Spectra of some self-exciting and mutually exciting point processes. Biometrika 58(1):83–90
Hawkes AG, Oakes D (1974) A cluster process representation of a self-exciting process. J Appl Probab 11(3):493–503, http://www.jstor.org/stable/3212693
Hedman ELE (2006) The Philippines in 2005: old dynamics, new conjuncture. Asian Survey 46(1):187–193
Holden R (1986) The contagiousness of aircraft hijacking. Am J Sociol 91(91):874–904
Holden R (1987) Time series analysis of a contagious process. J Am Stat Assoc 82(400):1019–1026
Hutchinson MC (1972) The concept of revolutionary terrorism. J Confl Resolut 16(3):383–396
ICG (2002) Indonesia backgrounder: how the Jemaah Islamiyah terrorist network operates. Tech. Rep. 43, International Crisis Group
Im EI, Cauley J, Sandler T (1987) Cycles and substitutions in terrorist activities: a spectral approach. Kyklos 40(2):238–255
Jackson BA, Baker J, Cragin K, Parachini J, Trujillo HR, Chalk P (2005) Aptitude for destruction volume 2: case studies of organizational learning in five terrorist groups. Tech. rep., Rand Corporation, Santa Monica CA
Jenkins-Smith HC, Herron KG (2005) United States public response to terrorism: fault lines or bedrock? Rev Policy Res 22:599–623
Johnson S (2008) Repeat burglary victimisation: a tale of two theories. J Exp Criminol 4(3):215–240
Johnson S, Summers L, Pease K (2009) Offender as forager? A direct test of the boost account of victimization. J Quant Criminol 25(2):181–200
Johnson SD, Bernasco W, Bowers KJ, Elffers H, Ratcliffe J, Rengert G, Townsley M (2007) Space-time patterns of risk: a cross national assessment of residential Burglary victimization. J Quant Criminol 23:201–219
Jones S (2008) Briefing for the new president: the terrorist threat in Indonesia and South-east Asia. Ann Am Acad Political Soc Sci 618:69–78
Kimhi S, Shamai M (2004) Community resilience and the impact of stress: adult response to Israel’s withdraw from Lebanon. J Community Psychol 32:439–451
Labrador MC (2002) The Philippines in 2000: In search of a Silver Lining. Asian Stud 41(1):221–229
LaFree G, Dugan L (2007) Introducing the global terrorism database. Terror Political Violence 19:181–204
LaFree G, Dugan L, Korte R (2009) The impact of British counter terrorist strategies on political violence in Northern Ireland: comparing deterrence and Backlash models. Criminology 47:17–45
LaFree G, Mazerolle L, Denning R, Miller E, White G, Yang SM (2011) Modeling the effectiveness of counter-terrorism strategies in Indonesia, the Philippines and Thailand. Research report, The National Consortium for the study of terrorism and responses to terrorism and The Australian Research Council Centre of Excellence in Policing and Security, US Department of Homeland Security Grant Award 2009-ST-108-000008 and the Australian Department of Prime Minister and Cabinet Grant Award PR09-0007
Lewis E, Mohler G, Brantingham PJ, Bertozzi AL (2011) Self-exciting point process models of civilian deaths in Iraq. Secur J. http://dx.doi.org/10.1057/sj.2011.21. Advance online publication 19 September
Li RP, Thompson WR (1975) The “Coup Contagion” hypothesis. J Confl Resolut 19:63–88
Liow JC (2006) Muslim resistance in Souther Thailand and Southern Philippines: religion, ideology and politics. Policy Studies 24, East-West Center, Washington DC, USA
Magnus JR, Neudecker H (1999) Matrix differential calculus with applications in statistics and econometrics. Wiley, New York
Mannan S (2005) Lees’ loss prevention in the process industries, 3rd edn. Butterworth-Heinemann, Oxford
Markowitz H (1952) Portfolio selection. J Finanac 7(1):77–91
May PJ, Sapotichne J, Workman S (2009) Widespread policy disruption: terrorism, public risks, and homeland security. Policy Stud J 37:171–194
Meyer S, Elias J, Höhle M (2011) A space-time conditional intensity model for invasive meningococcal disease occurrence. Biometrics doi:10.1111/j.1541-0420.2011.01684.x
Midlarsky MI (1978) Analyzing diffusion and contagion effects: the urban disorders of the 1960s. Am Political Sci Rev 72:996–1008
Midlarsky MI, Crenshaw M, Yoshida F (1980) Why Violence spreads: the contagion of international terrorism. Int Stud Q 24:341–365
Mohler GO, Short MB, Brantingham PJ, Schoenberg FP, Tita GE (2011) Self-exciting point process modeling of crime. J Am Stat Assoc 106(493):100–108
Mueller J, Stewart MG (2011) Terror, security, and money balancing the risks, benefits, and costs of homeland security. Oxford University Press, Oxford
Myers DJ (2000) The diffusion of collective violence: infectiousness, susceptibility, and mass media networks. Am J Sociol 106(1):178–208
Norris FH, Stevens SP, Pfefferbaum B, Wyche KF, Pfefferbaum RL (2008) Community resilience as a metaphor, theory, set of capacities, and strategy for disaster readiness. Am J Community Psychol 41:127–150
Ogata Y (1988) Statistical models for earthquake occurrences and residual analysis for point processes J Am Stat Assoc 83(401):9–27. http://www.jstor.org/stable/2288914
Ozaki T (1979) Maximum likelihood estimation of Hawkes’ self-exciting point processes. Ann Inst Stat Math 31:145–155
Perl R (2007) Combating terrorism: the challenge of measuring effectiveness. Report RL33160, Congressional Research Services
Pfefferbaum BJ, Reissman DB, Pfefferbaum RL, Klomp RW, Gurwitch RH (2007) Building resilience to mass trauma events. In: Doll LS, Bonzo SE, Sleet DA, Mercy JA (eds) Handbook of injury and violence prevention. Springer, New York, pp 347–358
Pierce GL, Spaar S, Briggs L (1988) The character of police work strategic and tactical implications. Tech. rep., Center for Applied Social Research, Boston, MA
Pizam A, Fleischer A (2002) Severity versus frequency of acts of terrorism: which has a larger impact on tourism demand? J Travel Res 40(3):337–339
Porter MD, White G (2012) Self-exciting hurdle models for terrorist activity. Ann Appl Stat 6(1):106–124
Porter MD, White G, Mazerolle LM (2012) Evidence-based counterterrorism policy. Springer, New York, NY, chap Innovative methods for terrorism and counterterrorism data, pp 91–112
Price JC, Forrest JS (2009) Practical aviation security: predicting and preventing future threats. Butterworth-Heinemann, Oxford
R Development Core Team (2011) R: A language and environment for statistical computing. R Foundation for Statistical Computing, Vienna, Austria. http://www.R-project.org, ISBN 3-900051-07-0
Rahimmula C (2004) Peace resolution: a case study of separatist and terrorist movement in Southern border provinces of Thailand. Songklanakarin J Soc Sci Humanit 10(1):97–112
Ratcliffe J, Rengert G (2008) Near-repeat patterns in Philadelphia shootings. Secur J 21(1):58–76
Renò R, Rizza R (2003) Is volatility lognormal? Evidence from Italian futures. Phys A 332:620–628
Rose A, Liao SY (2005) Modeling regional economic resilience to disasters: a computable general equilibrium analysis of water service disruptions. J Reg Sci 45(1):75–112
Ross ML (2005) Rebellion and resources in Aceh, Indonesia. In: Collier P, Sambanis N (eds) Understanding civil war: evidence and analysis, vol 2, The World Bank
Rutter M (1993) Resilience: some conceptual considerations. J Adolesc Health 14:626–631
Sarewitz D, Pielke R, Keykhah M (2003) Vulnerability and risk: some thoughts from a political and policy perspective. Risk Anal 23(4):805–810. doi:10.1111/1539-6924.00357
Schrodt PA, Gerner DJ (1996) Using cluster analysis to derive early warning indicators for the middle east, 1976–1979, paper presented at the American Political Science Association, San Francisco, 28 August–1 September 1996
Schrodt PA, Gerner DJ (2000) Cluster-based early warning indicators for political change in contemporary levant. Am Political Sci Rev 94(4):803–817
Shapiro JN, Cohen DK (2007) Color bind: lessons from the failed homeland security advisory system. Int Secur 32(2):121–154. doi:10.1162/isec.2007.32.2.121
Sherman L, Gartin P, Buerger M (1989) Hot spots of predatory crime: routine activities and the criminology of place. Criminology 27:27–56
Short MB, D’Orsogna MR, Brantingham PJ, Tita GE (2009) Measuring and modeling repeat and near-repeat burglary effects. J Quant Criminol 3:335–339
Sonn C, Fisher A (1998) A sense of community: community resilient response to oppression and change. J Community Psychol 26:457–472
Spelman W (1993) Abandoned buildings: magnets for crime? J Crim Justice 21:481–495
Stomakhin A, Short MB, Bertozzi AL (2011) Reconstruction of missing data in social networks based on temporal patterns of interactions. Inverse Probl 27(11). http://stacks.iop.org/0266-5611/27/i=11/a=115013
Sunstein CR (2003) Terrorism and probability neglect. J Risk Uncertain 26:2/3 121-136 2003 26:121–136
Taylor S (2005) Asset price dynamics, volatility, and prediction. Springer, New York
Telesca L, Lovallo M (2006) Are global terrorism attacks time-correlated? Phys A 362:480–484
Thornton TP (1964) Internal war, Free Press, New York, chap Terror as a weapon of political agitation, pp 71–99
Thywissen K (2006) Components of risk: a comparative glossary. SOURCE 2, United Nations University Institute for Environment and Human Security
Townsley M (2008) Visualising space time patterns in crime: the hotspot plot. Crime Patterns Anal 1:61–74
Townsley M, Johnson SD, Ratcliffe JH (2008) Space time dynamics of insurgent activity in Iraq. Secur J 21:139–146
van Biezen I (2005) Terrorism and democratic legitimacy: conflicting interpretations of the Spanish elections. Mediterr Politics 10:99–108
Vedenov DV, Duffield JA, Wetzstein ME (2006) Entry of alternative fuels in a volatile US gasoline market. J Agric Resour Econ 31:1–13
Veen A, Schoenberg F (2008) Estimation of space-time branching process models in seismology using an EM-type algorithm. J Am Stat Assoc 103(482):614–624
Wang Q, Schoenberg FP, Jackson DD (2010) Standard errors of parameter estimates in the ETAS model. Bull Seismol Soc Am 100(5A):1989–2001. doi:10.1785/0120100001, http://www.bssaonline.org/content/100/5A/1989.abstract, http://www.bssaonline.org/content/100/5A/1989.full.pdf+html
Wickes R, Zahnow R, Mazerolle L (2010) Community resilience: current approaches, challenges and opportunities. In: Mendis P, Yates A (eds) Recent advantages in national security technology and research, research network for a secure Australia, Australian security research centre
Willis HH, Morral AR, Kelly TK, Medby JM (2005) Estimating terrorism risks. Tech. rep., RAND Corporation
Yuen KV (2010) Appendix A: Relationship between the Hessian and covariance matrix for Gaussian random variables, Wiley, New York, pp 257–262. doi:10.1002/9780470824566.app1
Zhuang J, Ogata Y, Vere-Jones D (2002) Stochastic declustering of space-time earthquake occurrences. J Am Stat Assoc 97(458):369–380
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
White, G., Porter, M.D. & Mazerolle, L. Terrorism Risk, Resilience and Volatility: A Comparison of Terrorism Patterns in Three Southeast Asian Countries. J Quant Criminol 29, 295–320 (2013). https://doi.org/10.1007/s10940-012-9181-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10940-012-9181-y