Skip to main content

Application of a Profile Similarity Methodology for Identifying Terrorist Groups That Use or Pursue CBRN Weapons

  • Conference paper
Social Computing, Behavioral-Cultural Modeling and Prediction (SBP 2011)

Abstract

No single profile fits all CBRN-active groups, and therefore it is important to identify multiple profiles. In the analysis of terrorist organizations, linear and generalized regression modeling provide a set of tools to apply to data that is in the form of cases (named groups) by variables (traits and behaviors of the groups). We turn the conventional regression modeling “inside out” to reveal a network of relations among the cases on the basis of their attribute and behavioral similarity. We show that a network of profile similarity among the cases is built in to standard regression modeling, and that the exploitation of this aspect leads to new insights helpful in the identification of multiple profiles for actors. Our application builds on a study of 108 Islamic jihadist organizations that predicts use or pursuit of CBRN weapons.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ackerman, G.: Defining Knowledge Gaps within CBRN Terrorism Research. In: Ranstorp, M., Normark, M. (eds.) Unconventional Weapons and International Terrorism: Challenges and New Approaches, pp. 13–25. Routledge, London (2009)

    Google Scholar 

  2. Ackerman, G.: The Future of Jihadists and WMD. In: Ackerman, G., Tamsett, J. (eds.) Ji-hadists and Weapons of Mass Destruction, pp. 359–400. CRC Press, Boca Raton (2009)

    Chapter  Google Scholar 

  3. Asal, V.H., Rethemeyer, R.K.: Islamist Use and Pursuit of CBRN Terrorism. In: Ackerman, G., Tamsett, J. (eds.) Jihadists and Weapons of Mass Destruction, pp. 335–358. CRC Press, Boca Raton (2009)

    Chapter  Google Scholar 

  4. Ivanova, K., Sandler, T.: CBRN Attack Perpetrators: An Empirical Study. Foreign Policy Analysis 3, 273–294 (2007)

    Article  Google Scholar 

  5. Mowatt-Larssen, R.: Al Qaeda Weapons of Mass Destruction Threat: Hype Or Reality? Harvard Kennedy School Belfer Center for International Affairs, Cambridge (2010)

    Google Scholar 

  6. Raab, J., Milward, H.B.: Dark Networks as Problems. J. Public Adm. Res. Theory 13, 413–439 (2003)

    Article  Google Scholar 

  7. Belsley, D.A., Kuh, E., Welsch, R.E.: Regression Diagnostics: Identifying Influential Data and Sources of Collinearity. John Wiley, Hoboken (2004)

    MATH  Google Scholar 

  8. Pregibon, D.: Logistic Regression Diagnostics. The Annals of Statistics 9, 705–724 (1981)

    Article  MATH  Google Scholar 

  9. Ragin, C.C.: Redesigning Social Inquiry: Fuzzy Sets and Beyond. University of Chicago Press, Chicago (2008)

    Book  Google Scholar 

  10. Paul, C., Clarke, C.G., Grill, B.: Victory has a Thousand Fathers: Sources of Success in Counterinsurgency. RAND Corporation document number MG-964-OSD (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Breiger, R.L. et al. (2011). Application of a Profile Similarity Methodology for Identifying Terrorist Groups That Use or Pursue CBRN Weapons. In: Salerno, J., Yang, S.J., Nau, D., Chai, SK. (eds) Social Computing, Behavioral-Cultural Modeling and Prediction. SBP 2011. Lecture Notes in Computer Science, vol 6589. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19656-0_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-19656-0_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-19655-3

  • Online ISBN: 978-3-642-19656-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics