Abstract
With the persistent alarm being raised about terrorist violence by the media and government officials it is unsurprising that scholarship in this area has grown well beyond its traditional disciplinary boundaries (i.e., political science and international relations). As scholars from disciplines such as criminology [27, 30], computer science [11, 12, 35], economics [25], and others get more involved, more data sources have become available [1, 19, 28, 50] and more sophisticated analytical methods have been applied to terrorism research [14, 17, 30]. Yet, research on the effectiveness of counterterrorism measures has only incrementally improved in recent years [33].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Their sample includes American Political Science Review, Journal of Politics, American Journal of Political Science, International Organization, International Studies Quarterly, World Politics, Journal of Conflict Resolution, Journal of Peace Research, and Conflict Management and Peace Science.
- 2.
Network analysis provides another way to incorporate relational data into the field. In this case, the relationships are between and among terrorist groups, rather than between the groups and their targets. There have been some recent advances with network analysis, such as Asal and Rethemeyer’s Big, Allied, and Dangerous database [1] and Horowitz and Potter’s [24] study on the effects of network centrality on the diffusion of terrorist tactics.
- 3.
In our case, we used the CAMEO coding scheme.
- 4.
Schrodt estimates that TABARI codes 33 million times faster than the average human coder (2006).
- 5.
There were 9,530 actions detected for these countries from 1988 through 2004. As the authors publish studies using the data, they will become available to other researchers. The monthly version of GATE-Israel is available on the American Sociological Review’s website in an on-line appendix associated with their article [15].
- 6.
A much more elaborate analysis is found in Dugan and Chenoweth [15]. Also see that article for details about how the time-series dataset was constructed. Further, we also include in this analysis all terror attacks with an unknown perpetrator.
- 7.
As with Israel, we also include terror attacks by unknown perpetrators.
References
Asal V, Rethemeyer K (2008) The nature of the beast: organizational structures and the lethality of terrorist attacks. J Polit 70:437–449
Bapat N (2006) State bargaining with transnational terrorist groups. Int Stud Quart 50:213–229
Birnir JK, Baranov O, Perkoski E, Chenoweth E (2010) The turnaround of terror: constituent populations, terrorists, and counter-terror. Unpubl Manuscr, U Md
Brophy-Baermann B, Conybeare JA (1994) Retaliating against terrorism: rational expectations and the optimality of rules versus discretion Am J Polit Sci 38:196–210
Browne J, Dickson E (2010) “We don’t talk to terrorists”: on the rhetoric and practice of secret negotiations. J Confl Resolut 54:379–407
Byman D (2006) Do targeted killings work? Foreign Aff (85)95–107
Byman D (2009) Talking with insurgents: a guide for the perplexed. Wash Quart 32:125–137
Cauley J, Iksoon Im E (1988) Intervention policy analysis of skyjackings and other terrorist incidents. Am Econ Rev 78:27–31
Chenoweth E (2009) War initiation and transnational terrorism: is there a causal connection? Paper presented at the annual meeting of the International Studies Association, New York, USA, February
Chenoweth E, Lawrence A (2010) Rethinking violence: states and non-state actors in conflict. MIT Press, Cambridge
Clauset A, Heger L, Young M, Skrede Gleditsch K (2010) The strategic calculus of terrorism: substitution and competition in the Israel-Palestine conflict. Coop Confl 45:6–33
Clauset A, Young M, Skrede Gleditsch K (2007) On the frequency of sever terrorist events. J Conf Resolut 51:58–87
Cunningham D, Skrede Gleditsch K, Saleyhan I (2009) It takes two: a dyadic analysis of civil war duration and outcome. J Conf Resolut 53: 570–597
Dugan L (2011) The series hazard model: an alternative to time series for event data. J Quant Crim 27: 379–402
Dugan L, Chenoweth E (2012) Moving beyond deterrence: the effectiveness of raising the benefits of abstaining from terrorism in Israel. Am Soc Rev 77:forthcoming 597–624.
Dugan L, LaFree G, Piquero AR (2005) Testing a rational choice model of airline hijackings. Crim 43:1031–1066
Dugan L, Yang SM (2011) Introducing group-based trajectory analysis and series hazard modeling: Two innovative methods to systematically examine terrorism over time. In: Lum C, Kennedy L (eds) Evidence-based counterterrorism policy. Springer, New York
Enders W, Sandler T (1993) The effectiveness of antiterrorism policies: a vector-autoregression-intervention analysis. Am Polit Sci Rev 87:829–844
Freilich JD, Chermak SM, Belli R, Gruenewald J, Parkin WS (2012) Introducing the United States Extremist Crime Database (ECDB). Unpubl Manusc, John Jay Coll Crim Justice, CUNY
Gil-Alana L, Barros C (2010) A note on the effectiveness of national anti-terrorist policies: evidence from ETA. Confl Manag Peace Sci 27:28–46
Goldstein JS (1992). A conflict-cooperation scale for WEIS event data. J Confl Resolut 36: 369–385
Hafez M, Hatfield J (2006) Do targeted assassinations work? A multivariate analysis of Israel’s controversial tactic during the Al-Aqsa uprising. Stud Confl Terror 29:359–382
Hastie TJ, Tibshirani RJ (1990) Generalized additive models. Chapman and Hall, New York
Horowitz M, Potter P (2009) The network of terrorist organizations: the link between effectiveness and tactics. Unpubl Manuscr, U Pa
Krueger AB (2007) What makes a terrorist: economics and the roots of terrorism (New Edition). Princeton University Press, Princeton
Krueger AB, Laitin DD (2008) Kto-Kogo?: A cross-country study of the origins and targets of terrorism. In: Keefer P, Loayza N (eds) Terrorism, economic development, and openness. Cambridge University Press, New York
LaFree G, Dugan L (2004) How does studying terrorism compare to studying crime? In DeFlem M (ed) Terrorism and counter-terrorism: criminological perspectives. Elsevier, New York
LaFree G, Dugan L (2007) Introducing the global terrorism database. Terror Polit Violence 19:181–204
LaFree G, Dugan L, Korte R (2009) The impact of British counterterrorist strategies on political violence in Northern Ireland: Comparing deterrence and backlash models. Crim 47:501–530
LaFree G, Freilich JD (2012) Editors introduction: quantitative approaches to the study of terrorism (special issue). J Quant Crim 28:1–5
Landes W (1978) An economic study of U.S. aircraft hijacking, 1961–1976. J Law Econ 21: 1–31
Lapan HE, Sandler T (1988) To bargain or not to bargain: that is the question. Am Econ Rev 78:16–21
Lum C, Kennedy LW, Sherley A (2006) Are counter-terrorism strategies effective? The results of the Campbell systematic review on counter-terrorism evaluation research. J Exp Crim 2:489–516
Lyall J (2009) Does indiscriminate violence incite insurgent attacks? Evidence from Chechnya. J Confl Resolut 53:331–362
Mannes A, Shakarian J, Sliva A, Subrahmanian VS (2011) A computationally-enabled analysis of Lashkar-e-Taiba attacks in Jammu & Kashmir. Intelligence and Security Informatics Conference (EISIC), 2011 European, 224–229, 12–14 Sept. 2011
Markovsky D (2004) How to build a fence. Foreign Aff 83:50–64
Neumann P (2007) Negotiating with terrorists. Foreign Aff 86 128–138
Perkoski E, Chenoweth E (2010) The effectiveness of counterterrorism in Spain: a new approach. Paper presented at the International Studies Association annual meeting, New Orleans, LA, USA, March 15–17
Piazza JA, Walsh JI (2009) Transnational terrorism and human rights. Int Stud Quart 53: 125–48
Piazza JA, Walsh JI (2010) Physical integrity rights and terrorism. Polit Sci Polit 43:411–414
Plaw A (2008) Targeting terrorists: a license to kill? Ashgate, London
Rasler K (1996) Concessions, repression, and political protest in the Iranian revolution. Am Soc Rev 61:132–152
Schrodt PA (2001) Automated coding of international event data using sparse parsing techniques. Unpubl Manusc U Kans
Schrodt PA (2006) Twenty years of the Kansas Event Data System project. Unpubl Manusc, U Kans
Schrodt PA, Gerner DJ (1994) Validity assessment of a machine-coded event data set for the Middle East, 1982–1992. Am J Polit Sci 38:825–854
Schrodt PA., Davis SG, Weddle JL (1994) Political science: KEDS: a program for machine coding events data. Soc Sci Comput Rev 12:561–588
Shellman SM (2008) Coding disaggregated intrastate conflict: machine processing the behavior of substate actors over time and space. Polit Anal 16:464–477
Shellman SM, Hatfield C, Mills MJ (2010) Disaggregating actors in intranational conflict. J Peace Res 47:83–90
Sherman LW, Gottfredson D, MacKenzie DL, Eck J, Reuter P, Bushway S (1997) Preventing crime: what works, what doesn’t, what’s promising: a report to the United States congress. National Institute of Justice, Washington, DC
Smith BL, Damphousse KR (2002) American Terrorism Study: Patterns of Behavior, Investigation and Prosecution of American Terrorists, Final Report to the National Institute of Justice, Award Number: 1999-IJCX-0005
Testas A (2004) Determinants of terrorism in the Middle East. Terror Polit Violence 16: 253–273
Xiang D (2001) Fitting generalized additive models with the GAM procedure, SUGI Proceedings. SAS Institute, Inc., Cary NC
Young J, Findley M (2009) Promise, problems, and pitfalls of terrorism research. Paper presented at the Midwest Political Science Association annual meeting, Chicago, IL, USA, March 10–12
Zussman A, Zussman N (2006) Assassinations: evaluating the effectiveness of an Israeli counterterrorism policy using stock market data. J Econ Perspect 20:193–206
Walsh JI, Piazza JA (2010) Why respecting human rights reduces terrorism. Comp Polit Stud 43:551–577
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this chapter
Cite this chapter
Dugan, L., Chenoweth, E. (2013). Government Actions in Terror Environments (GATE): A Methodology that Reveals how Governments Behave toward Terrorists and their Constituencies. In: Subrahmanian, V. (eds) Handbook of Computational Approaches to Counterterrorism. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5311-6_21
Download citation
DOI: https://doi.org/10.1007/978-1-4614-5311-6_21
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-5310-9
Online ISBN: 978-1-4614-5311-6
eBook Packages: Computer ScienceComputer Science (R0)