This book covers computational conflict research in a range of facets, with its contributions using a variety of different approaches on several dimensions (methodology, conflict scale, geographic focus, etc.). It thereby addresses the full scope of the field, including primarily data-driven as well as primarily simulation-based approaches. The book brings together contributions from leading and emerging scholars with a diversity of disciplinary backgrounds from physics, mathematics, and biology to computer and data science to sociology and political science. The volume is also a truly international endeavor, with its authors’ institutional affiliations reaching across thirteen countries on three continents.
Methodologically, the book covers a variety of computational approaches from text mining and machine learning to agent-based modeling and simulation to social network analysis. Table 1 gives a more fine-grained overview of the different methodologies and computational approaches used.
Table 1 Computational approaches used/covered in the chapters of this book
Regarding data, several chapters make use of empirical conflict data that has only recently become available in such detail, be it large corpora of text or fine-grained, geo-tagged information on conflict events coded globally from news reports.Footnote 5 Geographically, these case studies add up to a comprehensive set of analyses of recent conflicts that spans multiple continents, as the map in Fig. 1 reveals. These contentions range from conflict lines in parliamentary debates on migration policy in the USA and Canada from 1994 to 2016 (chapter “Migration Policy Framing”) and the representation of street protest in Germany (2014–15) and Iran (2017–18) on social media (chapter “Fate of Social Protests”) to terrorist attacks in Colombia, Afghanistan, and Iraq between 2001 and 2005 (chapter “Non-state Armed Groups”) and violence against civilians in the Democratic Republic of Congo in 1998–2000 (chapter “Violence Against Civilians”) to conflict diffusion in South Sudan between 2014 and 2018 (chapter “Conflict Diffusion over Continuous Space”) and rebel group behavior in Somalia from 1991 to the present day (chapter “Rebel Group Protection Rackets”). Hence, a broad range of recent conflicts is covered.
The book is structured in three parts. Part I focuses on data and methods in computational conflict research and contains three contributions. Part II deals with non-violent, social conflict and comprises three chapters. Part III is about computational approaches to violent conflict and covers four chapters. In the following, we give a short overview about these individual chapters.
In the chapter “Advances in Data on Conflict,” Kristian Gleditsch, building on more than two decades of experience in peace and conflict studies, takes a look at the role of data in driving innovation in the field. He argues that the growth of systematic empirical data has been a central innovative force that has brought the field forward. Drawing on several examples, he demonstrates how data has served as a source of theoretical innovation in the field. This progress in data availability, he argues, has helped generate new research agendas. His contribution ends with an inventory of the most valuable data sources on conflict events to date—which, we believe, may be highly useful for readers interested in conducting their own research on conflicts globally.
In the chapter “Text as Data for Conflict Research,” Seraphine F. Maerz and Cornelius Puschmann give insights into how text can be used as data for conflict research. Arguing that computer-aided text analysis offers exciting new possibilities for conflict research, they delve into computational procedures that allow to analyze large quantities of text, from supervised and unsupervised machine learning to more traditional forms of content analysis, such as dictionaries. To illustrate these approaches, they draw on a range of example studies that investigate conflict based on text material across different formats and genres. This includes both conflict verbalized in news media, political speeches, and other public documents and conflict that occurs directly within online spaces like social media platforms and internet forums. Finally, they highlight cross-validation as a crucial step in using text as data for conflict research.
In the chapter “Relational Event Models,” Laurence Brandenberger introduces relational event models (REMs) as a powerful tool to examine how conflicts arise through human interaction and how they evolve over time. Building on event history analysis, these models combine network dependencies with temporal dynamics and allow for the analysis of social influencing and group formation patterns. The added information on the timing of social interactions and the broader network in which actors are embedded can uncover meaningful social mechanisms, Brandenberger argues. To illustrate the added value of REMs, the chapter showcases two empirical studies. The first one shows that countries engaging in military actions in the Gulf region do so by balancing their relations, i.e., by supporting allies of their allies and opposing enemies of their allies. The second one shows that party family homophily guides parliamentary veto decisions and provides empirical evidence of social influencing dynamics among European parliaments. Brandenberger also references her R package, which allows interested conflict researchers to apply REMs.
The chapter “Migration Policy Framing” opens Part II of the book with research on non-violent, social conflicts. Sanja Hajdinjak, Marcella H. Morris, and Tyler Amos put the text-as-data approach that was laid out in the chapter “Text as Data for Conflict Research” into empirical practice. Drawing on more than a decade of parliamentary speeches from the USA and Canada, they analyze how parties frame migration topics in political discourse. Building on work that argues that migration falls in a gap between established societal cleavages over which parties do not have robust, issue-specific ownership, Hajdinjak et al. argue that parties engage in debates on migration topics by diverting attention to areas in which they have established issue ownership. Using structural topic models, they test this assertion by measuring the differences in salience and framing of migration-related topics over time in the debates of the lower houses of Canada and the USA. Doing so, they do indeed find that, in both countries, liberals frame migration differently than conservatives.
In the chapter “Norm Conflict in Social Networks,” an interdisciplinary team of psychologists, sociologists, and physicists—Julian Kohne, Natalie Gallagher, Zeynep Melis Kirgil, Rocco Paolillo, Lars Padmos, and Fariba Karimi—model the spread and clash of norms in social networks. They argue that arriving at an overarching normative consensus in groups with different social norms can lead to intra- and intergroup conflict. Kohne et al. develop an agent-based model that allows to simulate the convergence of norms in social networks with two different groups in different network structures. Their model can adjust group sizes, levels of homophily as well as initial distribution of norms within the groups. Agents in the model update their norms according to the classic Granovetter threshold model, where a norm changes when the proportion of the agents’ ego-network displaying a different norm exceeds the agents’ threshold. Conflict, in line with Heider’s balance theory, is operationalized by the proportion of edges between agents that hold a different norm in converged networks. Their results suggest that norm change is most likely when norms are strongly correlated with group membership. Heterophilic network structures, with small to middling minority groups, exert the most pressure on groups to conform to one another. While the results of these simulations demonstrate that the level of homophily determines the potential conflict between groups and within groups, this contribution also showcases the impressive possibilities of ever-increasing computing power and how they can be used for conflict research: Kohne et al. ran their agent-based simulation on a high performance computing cluster; their simulation took about 315 hours to complete and generated 40 Gigabytes of output data.
Gravovetter’s threshold model and the spread of information in networks also play a role in the chapter “Fate of Social Protests,” in which Ahmadreza Asgharpourmasouleh, Masoud Fattahzadeh, Daniel Mayerhoffer, and Jan Lorenz simulate conditions for the emergence of social protests in an agent-based model. They draw on two recent historical protests from Iran and Germany to inform the modeling process. In their agent-based model, people, who are interconnected in networks, interact and exchange their concerns on a finite number of topics. They may start to protest either because their concern or the fraction of protesters in their social contacts exceeds their protest threshold, as in Granovetter’s threshold model. In contrast to many other models of social protests, their model also studies the coevolution of topics of concern in the public that is not (yet) protesting. Given that often a small number of citizens starts a protest, its fate depends not only on the dynamics of social activation but also on the buildup of concern with respect to competing topics. Asgharpourmasouleh et al. argue that today, this buildup often occurs in a decentralized way through social media. Their agent-based simulation allows to reproduce the structural features of the evolution of the two empirical cases of social protests in Iran and Germany.
In the chapter “Non-state Armed Groups,” an interdisciplinary team with backgrounds in data science, philosophy, biology, and political science—Simone Cremaschi, Baris Kirdemir, Juan Masullo, Adam R. Pah, Nicolas Payette, and Rithvik Yarlagadda—look at the network structure of non-state armed groups (NSAGs) in Colombia, Iraq, and Afghanistan from 2001 to 2005. They use a self-exciting temporal model to ask if the behavior of one NSAG affects the behavior of other groups operating in the same country and if the actions of groups with actual ties (i.e., groups with some recognized relationship) have a larger effect than those with environmental ties (i.e., groups simply operating in the same country). The team finds mixed results for the notion that the actions of one NSAG influence the actions of others operating in the same conflict. In Iraq and Afghanistan, they find evidence that NSAG actions do influence the timing of attacks by other NSAGs; however, there is no discernible link between NSAG actions and the timing of attacks in Colombia. However, they do consistently find that there is no significant difference between the effects that actual or environmental ties could have in these three cases.
In the chapter “Violence Against Civilians,” political scientists Andrea Salvi, Mark Williamson, and Jessica Draper examine why some conflict zones exhibit more violence against civilians than others. They assess that past research has emphasized ethnic fractionalization, territorial control, and strategic incentives, but overlooked the consequences of armed conflict itself. This oversight, Salvi et al. argue, is partly due to the methodological hurdles of finding an appropriate counterfactual for observed battle events. In their contribution, they aim to test empirically the effect of instances of armed clashes between rebels and the government in civil wars on violence against civilians. Battles between belligerents may create conditions that lead to surges in civilian killings as combatants seek to consolidate civilian control or inflict punishment against populations residing near areas of contestation. Since there is no relevant counterfactual for these battles, they utilize road networks to help build a synthetic risk-set of plausible locations for conflict. Road networks are crucial for the logistical operations of a civil war and are thus the main conduit for conflict diffusion. As such, the majority of battles should take place in the proximity of road networks; by simulating events in the same geographic area, Salvi et al. are able to better approximate locations where battles hypothetically could have occurred, but did not. They test this simulation approach using a case study of the Democratic Republic of the Congo (1998–2000) and model the causal effect of battles using a spatially disaggregated framework. Their work contributes to the literature on civil war violence by offering a framework for crafting synthetic counterfactuals with event data, and by proposing an empirical test for explaining the variation of violence against civilians as a result of battle events.
In the chapter “Conflict diffusion over Continuous Space,” statistician Claire Kelling and political scientist YiJyun Lin study the diffusion of conflict events through an innovative application of methods of spatial statistics. They investigate how spatial interdependencies between conflict events vary depending on several attributes of the events and actors involved. Kelling and Lin build on the fact—similarly observed by Gleditsch in the chapter “Advances in Data on Conflict”—that due to recent technological advances, conflict events can now be analyzed using data measured at the event level, rather than relying on aggregated units. Looking at the case of South Sudan, they demonstrate how the intensity function defined by the log-Gaussian Cox process model can be used to explore the complex underlying diffusion mechanism under various characteristics of conflict events. Their findings add to the explanation of the process of conflict diffusion, e.g., by revealing that battles with territorial gains for one side tend to diffuse over larger distances than battles with no territorial change, and that conflicts with longer duration exhibit stronger spatial dependence.
In the chapter “Rebel Group Protection Rackets,” Frances Duffy, Kamil C. Klosek, Luis G. Nardin, and Gerd Wagner present an agent-based model that simulates how rebel groups compete for territory and how they extort local enterprises to finance their endeavors. In this model, rebel groups engage in a series of economic transactions with the local population during a civil war. These interactions resemble those of a protection racket, in which aspiring governing groups extort the local economic actors to fund their fighting activities and control the territory. Seeking security in this unstable political environment, these economic actors may decide to flee or to pay the rebels in order to ensure their own protection, impacting the outcomes of the civil war. The model reveals mechanisms that are helpful for understanding violence outcomes in civil wars, and the conditions that may lead certain rebel groups to prevail. By simulating several different scenarios, Duffy et al. demonstrate the impact that different security factors have on civil war dynamics. Using Somalia as a case study, they also assess the importance of rebel groups’ economic bases of support in a real-world setting.
The agent-based simulation models constructed in several of these chapters are all available online. They can be downloaded or applied directly in the web browser. Interested readers can thus replicate the outcomes presented in this book, adjust parameters, and build on the code to advance in their own research. An overview of this online material is available at the end of this book, together with information on further supplementary material, such as replication files and links to the data sources used.
Figure 2 shows how the chapters that are based on empirical studies (i.e., Parts II and III of the book) can be placed on a two-dimensional space that can be interpreted as representing the field of computational conflict research. In this space, the vertical axis describes the intensity of the conflict studied, running from “non-violent” to “violent.” The horizontal axis describes the computational approach that is used, ranging from “simulation-based” to “data-driven.” As can be seen, the book at hand covers all four quadrants that constitute the field. The chapter “Norm Conflict in Social Networks,” for example, where the interaction of actors with different social norms is studied, is an example of computational conflict research that is based entirely on simulations and that deals with non-violent, social conflict. The chapter “Migration Policy Framing,” in which party differences in parliamentary debates are analyzed, also deals with non-violent conflict, but is mostly data-driven. In the upper left quadrant, we see the chapter “Rebel Group Protection Rackets,” which, with its agent-based model on rebel group protection rackets, deals with violent conflict and is mainly simulation-based, although some parameters are adjusted according to the real-world case of Somalia as mentioned above (accordingly, it is placed somewhat towards the center of the horizontal axis, denoting a mix of both simulation-based and data-driven approaches). Finally, in the upper right corner, we see, for instance, the chapter “Conflict Diffusion over Continuous Space,” which deals with the diffusion of violent conflict events (e.g., battles) in continuous space and is mainly data-driven. The chapter “Non-state Armed Groups” uses both a large-scale dataset and draws on simulation techniques and is thus placed toward the center of the horizontal axis.
Although this two-dimensional representation is of course quite simple—and perhaps even simplistic—it should in theory be possible to place any research conducted in the field of computational conflict research—including the studies discussed in Sect. 3—somewhere in this space. We thus hope this representation may prove to become a useful heuristic for the field.
By bringing together novel research by an international team of scholars from a range of fields, this book strives to contribute to consolidating the emerging field of computational conflict research. It aims to be a valuable resource for students, scholars, and a general audience interested in the prospects of using computational social science to advance our understanding of conflict dynamics in all their facets.