Terrorist attacks on educational institutions have taken many forms: armed assaults, bombings, hostage takings, chemical attacks, and arson. This paper focuses on armed assaults. The frequency of this type of attack on educational institutions has increased sharply since 2003, with the incident rate in 2007 being double that of the previous year. A comprehensive chronology of all armed assaults on educational institutions since 1980 (N = 146) was created with reference to the Global Terrorism Database, and other credible sources. Descriptive reports of each incident were subjected to content analysis according to a series of 16 variables. These variables describe various aspects of the incident including information about who the victim(s) were, where and when the attack took place, and who the offender(s) were. The data set was analysed using traditional inferential statistics illustrating that armed terrorist attacks on educational institutions have increased in lethality, but changed in terms of the main targets. The data were also analysed using Multidimensional Scalogram Analysis (MSA) to explore inter-relationships between behaviors and identify the underlying dimensions in terrorist attacks on educational institutions. The analysis demonstrates that attacks can be classified on an expressive-instrumental continuum and the implications are discussed.
This is a preview of subscription content, access via your institution.
Buy single article
Instant access to the full article PDF.
Tax calculation will be finalised during checkout.
Subscribe to journal
Immediate online access to all issues from 2019. Subscription will auto renew annually.
Tax calculation will be finalised during checkout.
This goes against the long held view that terrorist actors are characterised by psychological disorder (see Horgan, 2005, for review).
The means displayed in Figure 1 represent the number of school-associated victims per incident. This figure does not include terrorist fatalities or ‘other’ victim (e.g., police officer, security service) fatalities. It is these figures that further statistical analysis was run on. The mean for the 2000s decade was calculated including the fatality figures for the Beslan incident. While this figure may have inflated the mean represented in Figure 1, its inclusion will not have affected the outcome of the statistical tests as non-parametric tests are run on the ranks of data rather than the raw data itself.
Incidents in which the terrorist group responsible was ‘unknown’ were excluded from the statistical analysis. The descriptive statistics for these incidents have been included in Table II for completeness.
The mean values displayed in Table II were calculated excluding one incident (Beslan attack) which represented a statistically significant outlier that would have skewed the results.
This refers to the number of school-associated victims per incident. This figure does not include terrorist fatalities or ‘other’ victim (e.g., police officer, security service) fatalities.
Mean values calculated excluding Beslan.
Abuza Z (2003) Funding terrorism in Southeast Asia: The financial network of Al Qaedaand Jemaah Islamiyah. National Bureau of Asian Research 14(5):5–68
Ainsworth P (2001) Offender Profiling and Crime Analysis. Willan Publishing, Devon, UK
Anderton CH, Carter JR (2005) On rational choice theory and the study of terrorism. Defence and Peace Economics 16(4):275–282
Becker GS (1968) Crime and punishment: An economic approach. Journal of Political Economy 76:169–217
Berkowitz L (1993) Aggression: Its Causes, Consequences and Control. Temple University Press, Philadelphia
Block R (1977) Violent Crime. Lexington Books/DC Heath, Lexington, MA
Borg I, Shye S (1995) Facet Theory: Form and Content. Sage, London
Browne D (2003) Examining the impact of terrorism on children. In: Silke A (ed) Terrorists, Victims and Society: Psychological Perspectives on Terrorism and its Consequences. Wiley, West Sussex, UK, pp 189–211
Buss AH (1961) The Psychology of Aggression. John Wiley and Sons, New York
Campbell L (2010) Responding to gun crime in Ireland. British Journal of Criminology 50(3):414–434
Canter D (1994) Criminal Shadows. Harper Collins, London
Canter D, Alison LJ, Alison E, Wentink N (2004) The organized/disorganized typology of serial murder: Myth or model? Psychology, Public Policy, and Law 10(3):293–320
Canter D, Fritzon K (1998) Differentiating arsonists: A model of firesetting actions and characteristics. Legal and Criminological Psychology 3:73–96
Canter D, Heritage R (1990) A multivariate model of sexual offence behavior: Developments in offender profiling. Part 1. Journal of Forensic Psychiatry 1:185–212
Caplan B (2006) Terrorism: The relevance of the rational choice model. Public Choice 128:91–107
Clarke DB, Felson M (1993) Routine Activity and Rational Choice: Advances in Criminological Theory, vol 5. Transaction, London
Cornish DB, Clarke RV (1986) The Reasoning Criminal: Rational Choice Perspectives on Offending. Springer, New York
Crenshaw M (1981) The causes of terrorism. Comparative Politics 13(4):379–399
Crenshaw M (1986) The psychology of political terrorism. In: Hermann M (ed) Political Psychology: Contemporary Problems and Issues. Josey-Bass, London, pp 379–413
Crenshaw M (2006) Have motivations for terrorism changed? In: Victoroff J (ed) Tangled Roots: Social and Psychological Factors in the Genesis of Terrorism. IOS Press, Oxford
Doran MS (2002) Somebody else’s civil war. In: Griest P, Mahan S (eds) Terrorism in Perspective. Sage Publications, London, pp 73–85
Dorn M, Dorn C (2005) Innocent Targets: When Terrorism Comes to School. Safe Havens International Inc, Canada
Dunbar E (2003) Symbolic, relational, and ideological signifiers of bias-motivated offenders: Toward a strategy of assessment. American Journal of Orthopsychiatry 73(2):203–211
Enders W, Sandler T (2006) The Political Economy of Terrorism. Cambridge University Press, Cambridge
Feller, B. (2004, October 8). Computer disc found in Iraq contained U.S. school plans. USA Today. Retrieved from http://www.usatoday.com/news/world/iraq/2004-10-07-school-disk_x.html. (accessed 22/03/13).
Fesbach S (1964) The function of aggression and the regulation of aggressive drive. Psychological Review 71:257–272
Global Terrorism Database Codebook: variables & inclusion criteria. May 2010. Retrieved from http://www.start.umd.edu/gtd/downloads/Codebook.pdf (accessed 22/03/2013).
Guttman L (1991) Chapters from an unfinished textbook on facet theory. Hebrew University Press, Jerusalem, Israel
Horgan J (2005) The Psychology of Terrorism. Routledge, London
Johnston, R. (2009, December 8). Terrorist and criminal attacks targeting children. Retrieved from www.johnstonarchive.net/terrorism/wrjp39ch.html (accessed 22/03/2013).
Juvonen, J. (2001). School violence: Prevalence, fears, and prevention. Rand Education Issue Paper. Retrieved from http://www.rand.org/publications/IP/IP219 (accessed 22/03/2013).
LaFree G, Hendrickson J (2007) Build a criminal justice policy for terrorism. Criminology and Public Policy 6:781–789
LaFree, G., Morris, N. A., and Dugan, L. (2009). Cross-national patterns of terrorism: Comparing trajectories for total, attributed and fatal attacks, 1970–2006. British Journal of Criminology Advance Access published November 5, 2009, 10.1093/bjc/azp066.
Landis JR, Koch GG (1977) The measurement of observer agreement for categorical data. Biometrics 33(1):159–174. doi:10.2307/2529310
Last SK, Fritzon K (2005) Investigating the nature of expressiveness in stranger, acquaintance and intrafamilial homicides. Journal of Investigative Psychology and Offender Profiling 2:179–193
Levy S (1994) Louis Guttman on Theory and Methodology: Selected Writings. Ashgate, Aldershot, UK
Long DE (1990) The Anatomy of Terrorism. Free Press, New York
Megargee, E.I. (1966). Undercontrolled and overcontrolled personality types in extreme antisocial aggression. Psychological Monographs. 80(3, Whole No. 611).
Olson, D. T. (2005). The Path to Terrorist Violence: A Threat Assessment Model for Radical Groups at Risk of Escalation to Acts of Terrorism. Master’s thesis, Naval Postgraduate School, Monterey, CA. Retrieved from https://www.hsdl.org/homesec/docs/theses/05Sep_Olson.pdf&code=08ed3b0e4d34e346e2dc3540cdc0e1f8 (accessed 22/03/2013).
Perl, R. (1997). Terrorism, the Media and the Government: Perspectives, trends and Options for policymakers, Congressional Research Service. Retrieved from http://www.fas.org/irp/crs/crs-terror.htm (accessed 22/03/2013).
Perl R (2002) Terrorism, the media and the government: Perspectives, trends, and options for policy makers. In: Griest P, Mahan (eds) Terrorism in Perspective. Sage Publications, London, pp 143–150
Ressler RK, Burgess AW, Douglas JE (1988) Sexual Homicide: Patterns and Motives. Lexington Books, Lexington, MA
Ressler RK, Burgess AW, Douglas JE, Hartman CR, D’Agostino RB (1986) Sexual killers and their victims: Identifying patterns through crime scene analysis. Journal of Interpersonal Violence 1:288–308
Ressler RK, Shachtman T (1992) Whoever Fights Monsters. Simon and Schuster, London
Richardson L (2006) What Terrorists Want: Understanding the Threat. John Murray Publishers, London
Salfati, C.G. (2001). The Nature of Expressiveness and Instrumentality in Homicide, and its Implication for Offender Profiling. Paper Presented at the 6th Investigating Psychology Conference, Liverpool, England.
Salfati, C.G., and Grey, J. (2002). Profiling U.S. Homicide. Paper Presented at the Annual Meeting of the American Society of Criminology, November, Chicago.
Salfati CG, Haratsis EA (2001) Behavioral examination of offender crime-scene actions. Homicide Studies 5:335–362
Schmid AP (1993) Defining terrorism: The response problem as a definition problem. In: Schmid AP, Crelinsten RD (eds) Western Responses to Terrorism. Frank Cass, London
Shye S, Elizur D, Hoffman M (1994) Introduction to Facet Theory: Content Design and Intrinsic Data Analysis in Behavioral Research. Sage, London
Spjut RJ (1983) Criminal statistics and statistics on security in Northern Ireland. British Journal of Criminology 23:358–380
Toch H (1969) Violent Men: An Inquiry into the Psychology of Violence. Aldine, Chicago
Wilson MA (1995) Structuring qualitative data: Multidimensional scalogram analysis. In: Breakwell GM, Hammond S, Fife-Schaw C (eds) Research Methods in Psychology. Sage, London
Wilson MA (2000) Toward a model of terrorist behavior in hostage-taking incidents. Journal of Conflict Resolution 44:403–424
Wilson, M.A., and Smith, A. (1999). Rules and roles in terrorist hostage taking. In: D. Canter & L.Alison. (eds) The social psychology of crime: Groups, teams and networks. (ch.5). Aldershot: Ashgate.
Wilson MA, Canter D, Jack K (1997) The Psychology of Rape Investigation: A Study in Police Decision Making, Final Report. ESRC, Swindon, UK
Wilson MA, Scholes A, Brocklehurst E (2010) Behavioral analysis of terrorist action: The assassination and bombing campaigns of ETA between 1980 and 2007. British Journal of Criminology 50:690–707
Woo, G. (2004). Understanding Terrorism Risk. Report for Risk Management Solutions. Retrieved from https://www.rmsweather.org/Publications/UnderstandTerRisk_Woo_RiskReport04.pdf (accessed 22/03/2013).
Zillman D (1979) Hostility and Aggression. Erlbaum, Hillsdale, NJ
Zvulun E (1978) Multidimensional scalogram analysis: The method and its application. In: Shye S (ed) Theory Construct and Data Analysis in the Behavioral Sciences. Jossey-Bass, San Francisco
About this article
Cite this article
Bradford, E., Wilson, M.A. When terrorists target schools: An exploratory analysis of attacks on educational institutions. J Police Crim Psych 28, 127–138 (2013). https://doi.org/10.1007/s11896-013-9128-8
- armed assault
- educational institutions
- expressive-instrumental continuum