Skip to main content

Government Actions in Terror Environments (GATE): A Methodology that Reveals how Governments Behave toward Terrorists and their Constituencies

  • Chapter
  • First Online:
Handbook of Computational Approaches to Counterterrorism

Abstract

With the persistent alarm being raised about terrorist violence by the media and government officials it is unsurprising that scholarship in this area has grown well beyond its traditional disciplinary boundaries (i.e., political science and international relations). As scholars from disciplines such as criminology [27, 30], computer science [11, 12, 35], economics [25], and others get more involved, more data sources have become available [1, 19, 28, 50] and more sophisticated analytical methods have been applied to terrorism research [14, 17, 30]. Yet, research on the effectiveness of counterterrorism measures has only incrementally improved in recent years [33].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 149.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Their sample includes American Political Science Review, Journal of Politics, American Journal of Political Science, International Organization, International Studies Quarterly, World Politics, Journal of Conflict Resolution, Journal of Peace Research, and Conflict Management and Peace Science.

  2. 2.

    Network analysis provides another way to incorporate relational data into the field. In this case, the relationships are between and among terrorist groups, rather than between the groups and their targets. There have been some recent advances with network analysis, such as Asal and Rethemeyer’s Big, Allied, and Dangerous database [1] and Horowitz and Potter’s [24] study on the effects of network centrality on the diffusion of terrorist tactics.

  3. 3.

    In our case, we used the CAMEO coding scheme.

  4. 4.

    Schrodt estimates that TABARI codes 33 million times faster than the average human coder (2006).

  5. 5.

    There were 9,530 actions detected for these countries from 1988 through 2004. As the authors publish studies using the data, they will become available to other researchers. The monthly version of GATE-Israel is available on the American Sociological Review’s website in an on-line appendix associated with their article [15].

  6. 6.

    A much more elaborate analysis is found in Dugan and Chenoweth [15]. Also see that article for details about how the time-series dataset was constructed. Further, we also include in this analysis all terror attacks with an unknown perpetrator.

  7. 7.

    As with Israel, we also include terror attacks by unknown perpetrators.

References

  1. Asal V, Rethemeyer K (2008) The nature of the beast: organizational structures and the lethality of terrorist attacks. J Polit 70:437–449

    Article  Google Scholar 

  2. Bapat N (2006) State bargaining with transnational terrorist groups. Int Stud Quart 50:213–229

    Article  Google Scholar 

  3. Birnir JK, Baranov O, Perkoski E, Chenoweth E (2010) The turnaround of terror: constituent populations, terrorists, and counter-terror. Unpubl Manuscr, U Md

    Google Scholar 

  4. Brophy-Baermann B, Conybeare JA (1994) Retaliating against terrorism: rational expectations and the optimality of rules versus discretion Am J Polit Sci 38:196–210

    Article  Google Scholar 

  5. Browne J, Dickson E (2010) “We don’t talk to terrorists”: on the rhetoric and practice of secret negotiations. J Confl Resolut 54:379–407

    Article  Google Scholar 

  6. Byman D (2006) Do targeted killings work? Foreign Aff (85)95–107

    Google Scholar 

  7. Byman D (2009) Talking with insurgents: a guide for the perplexed. Wash Quart 32:125–137

    Article  Google Scholar 

  8. Cauley J, Iksoon Im E (1988) Intervention policy analysis of skyjackings and other terrorist incidents. Am Econ Rev 78:27–31

    Google Scholar 

  9. Chenoweth E (2009) War initiation and transnational terrorism: is there a causal connection? Paper presented at the annual meeting of the International Studies Association, New York, USA, February

    Google Scholar 

  10. Chenoweth E, Lawrence A (2010) Rethinking violence: states and non-state actors in conflict. MIT Press, Cambridge

    Google Scholar 

  11. Clauset A, Heger L, Young M, Skrede Gleditsch K (2010) The strategic calculus of terrorism: substitution and competition in the Israel-Palestine conflict. Coop Confl 45:6–33

    Article  Google Scholar 

  12. Clauset A, Young M, Skrede Gleditsch K (2007) On the frequency of sever terrorist events. J Conf Resolut 51:58–87

    Article  Google Scholar 

  13. Cunningham D, Skrede Gleditsch K, Saleyhan I (2009) It takes two: a dyadic analysis of civil war duration and outcome. J Conf Resolut 53: 570–597

    Article  Google Scholar 

  14. Dugan L (2011) The series hazard model: an alternative to time series for event data. J Quant Crim 27: 379–402

    Article  Google Scholar 

  15. Dugan L, Chenoweth E (2012) Moving beyond deterrence: the effectiveness of raising the benefits of abstaining from terrorism in Israel. Am Soc Rev 77:forthcoming 597–624.

    Google Scholar 

  16. Dugan L, LaFree G, Piquero AR (2005) Testing a rational choice model of airline hijackings. Crim 43:1031–1066

    Article  Google Scholar 

  17. Dugan L, Yang SM (2011) Introducing group-based trajectory analysis and series hazard modeling: Two innovative methods to systematically examine terrorism over time. In: Lum C, Kennedy L (eds) Evidence-based counterterrorism policy. Springer, New York

    Google Scholar 

  18. Enders W, Sandler T (1993) The effectiveness of antiterrorism policies: a vector-autoregression-intervention analysis. Am Polit Sci Rev 87:829–844

    Article  Google Scholar 

  19. Freilich JD, Chermak SM, Belli R, Gruenewald J, Parkin WS (2012) Introducing the United States Extremist Crime Database (ECDB). Unpubl Manusc, John Jay Coll Crim Justice, CUNY

    Google Scholar 

  20. Gil-Alana L, Barros C (2010) A note on the effectiveness of national anti-terrorist policies: evidence from ETA. Confl Manag Peace Sci 27:28–46

    Article  Google Scholar 

  21. Goldstein JS (1992). A conflict-cooperation scale for WEIS event data. J Confl Resolut 36: 369–385

    Article  Google Scholar 

  22. Hafez M, Hatfield J (2006) Do targeted assassinations work? A multivariate analysis of Israel’s controversial tactic during the Al-Aqsa uprising. Stud Confl Terror 29:359–382

    Article  Google Scholar 

  23. Hastie TJ, Tibshirani RJ (1990) Generalized additive models. Chapman and Hall, New York

    MATH  Google Scholar 

  24. Horowitz M, Potter P (2009) The network of terrorist organizations: the link between effectiveness and tactics. Unpubl Manuscr, U Pa

    Google Scholar 

  25. Krueger AB (2007) What makes a terrorist: economics and the roots of terrorism (New Edition). Princeton University Press, Princeton

    Google Scholar 

  26. Krueger AB, Laitin DD (2008) Kto-Kogo?: A cross-country study of the origins and targets of terrorism. In: Keefer P, Loayza N (eds) Terrorism, economic development, and openness. Cambridge University Press, New York

    Google Scholar 

  27. LaFree G, Dugan L (2004) How does studying terrorism compare to studying crime? In DeFlem M (ed) Terrorism and counter-terrorism: criminological perspectives. Elsevier, New York

    Google Scholar 

  28. LaFree G, Dugan L (2007) Introducing the global terrorism database. Terror Polit Violence 19:181–204

    Article  Google Scholar 

  29. LaFree G, Dugan L, Korte R (2009) The impact of British counterterrorist strategies on political violence in Northern Ireland: Comparing deterrence and backlash models. Crim 47:501–530

    Article  Google Scholar 

  30. LaFree G, Freilich JD (2012) Editors introduction: quantitative approaches to the study of terrorism (special issue). J Quant Crim 28:1–5

    Article  Google Scholar 

  31. Landes W (1978) An economic study of U.S. aircraft hijacking, 1961–1976. J Law Econ 21: 1–31

    Article  Google Scholar 

  32. Lapan HE, Sandler T (1988) To bargain or not to bargain: that is the question. Am Econ Rev 78:16–21

    Google Scholar 

  33. Lum C, Kennedy LW, Sherley A (2006) Are counter-terrorism strategies effective? The results of the Campbell systematic review on counter-terrorism evaluation research. J Exp Crim 2:489–516

    Article  Google Scholar 

  34. Lyall J (2009) Does indiscriminate violence incite insurgent attacks? Evidence from Chechnya. J Confl Resolut 53:331–362

    Article  Google Scholar 

  35. Mannes A, Shakarian J, Sliva A, Subrahmanian VS (2011) A computationally-enabled analysis of Lashkar-e-Taiba attacks in Jammu & Kashmir. Intelligence and Security Informatics Conference (EISIC), 2011 European, 224–229, 12–14 Sept. 2011

    Google Scholar 

  36. Markovsky D (2004) How to build a fence. Foreign Aff 83:50–64

    Article  Google Scholar 

  37. Neumann P (2007) Negotiating with terrorists. Foreign Aff 86 128–138

    Google Scholar 

  38. Perkoski E, Chenoweth E (2010) The effectiveness of counterterrorism in Spain: a new approach. Paper presented at the International Studies Association annual meeting, New Orleans, LA, USA, March 15–17

    Google Scholar 

  39. Piazza JA, Walsh JI (2009) Transnational terrorism and human rights. Int Stud Quart 53: 125–48

    Article  Google Scholar 

  40. Piazza JA, Walsh JI (2010) Physical integrity rights and terrorism. Polit Sci Polit 43:411–414

    Google Scholar 

  41. Plaw A (2008) Targeting terrorists: a license to kill? Ashgate, London

    Google Scholar 

  42. Rasler K (1996) Concessions, repression, and political protest in the Iranian revolution. Am Soc Rev 61:132–152

    Article  Google Scholar 

  43. Schrodt PA (2001) Automated coding of international event data using sparse parsing techniques. Unpubl Manusc U Kans

    Google Scholar 

  44. Schrodt PA (2006) Twenty years of the Kansas Event Data System project. Unpubl Manusc, U Kans

    Google Scholar 

  45. Schrodt PA, Gerner DJ (1994) Validity assessment of a machine-coded event data set for the Middle East, 1982–1992. Am J Polit Sci 38:825–854

    Article  Google Scholar 

  46. Schrodt PA., Davis SG, Weddle JL (1994) Political science: KEDS: a program for machine coding events data. Soc Sci Comput Rev 12:561–588

    Article  Google Scholar 

  47. Shellman SM (2008) Coding disaggregated intrastate conflict: machine processing the behavior of substate actors over time and space. Polit Anal 16:464–477

    Article  Google Scholar 

  48. Shellman SM, Hatfield C, Mills MJ (2010) Disaggregating actors in intranational conflict. J Peace Res 47:83–90

    Article  Google Scholar 

  49. Sherman LW, Gottfredson D, MacKenzie DL, Eck J, Reuter P, Bushway S (1997) Preventing crime: what works, what doesn’t, what’s promising: a report to the United States congress. National Institute of Justice, Washington, DC

    Google Scholar 

  50. Smith BL, Damphousse KR (2002) American Terrorism Study: Patterns of Behavior, Investigation and Prosecution of American Terrorists, Final Report to the National Institute of Justice, Award Number: 1999-IJCX-0005

    Google Scholar 

  51. Testas A (2004) Determinants of terrorism in the Middle East. Terror Polit Violence 16: 253–273

    Article  Google Scholar 

  52. Xiang D (2001) Fitting generalized additive models with the GAM procedure, SUGI Proceedings. SAS Institute, Inc., Cary NC

    Google Scholar 

  53. Young J, Findley M (2009) Promise, problems, and pitfalls of terrorism research. Paper presented at the Midwest Political Science Association annual meeting, Chicago, IL, USA, March 10–12

    Google Scholar 

  54. Zussman A, Zussman N (2006) Assassinations: evaluating the effectiveness of an Israeli counterterrorism policy using stock market data. J Econ Perspect 20:193–206

    Article  Google Scholar 

  55. Walsh JI, Piazza JA (2010) Why respecting human rights reduces terrorism. Comp Polit Stud 43:551–577

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Laura Dugan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this chapter

Cite this chapter

Dugan, L., Chenoweth, E. (2013). Government Actions in Terror Environments (GATE): A Methodology that Reveals how Governments Behave toward Terrorists and their Constituencies. In: Subrahmanian, V. (eds) Handbook of Computational Approaches to Counterterrorism. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5311-6_21

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-5311-6_21

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-5310-9

  • Online ISBN: 978-1-4614-5311-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics