Abstract
Terrorism and particularly suicide terrorist campaigns have became a high priority for governments, the media, and the general public. It is imperative to have a comprehensive security risk management programme including effective risk assessment and appropriate decision support for such activities. Terrorism risk assessment (TRA) therefore plays a crucial role in national and international security. In order to predict terrorist behaviour from a given set of evidence (including hypothesised scenarios), it is often necessary for investigators to reconstruct the possible scenarios that may have taken place.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
B.C. Ezell, S.P. Bennett, D. Von Winterfeldt, J. Sokolowski, A.J. Collins, Probabilistic risk analysis and terrorism risk. Risk Anal. 30(4), 575–589 (2010)
J.L. Darby, Evaluation of Risk from Acts of Terrorism: The Adversary/defender Model using Belief and Fuzzy Sets (United States, Department of Energy, 2006)
U. Inyaem, P. Meesad, C. Haruechaiyasak, D. Tran, Terrorism event classification using fuzzy inference systems (IJCSIS). Int. J. Comput. Sci. Inf. Secur. 7(3) (2010)
J.B. Bowles, C.Enrique Peláez, Fuzzy logic prioritization of failures in a system failure mode, effects and criticality analysis. Reliab. Eng. Syst. Saf. 50(2), 203–213 (1995)
J.B. Bowles, Peláez, C. Enrique, Linguistic Evaluation of Terrorist Scenarios: Example Application, SAND2007-1301 (Sandia National Laboratories, Albuquerque, NM, 2007)
X. Fu, Q. Shen, Fuzzy compositional modeling. IEEE Trans Fuzzy Syst. 18(4), 823–840 (2010)
Q. Shen, J. Keppens, C. Aitken, B. Schafer, M. Lee, A scenario-driven decision support system for serious crime investigation. Law Probab. Risk 5(2), 87–117 (2006)
W.L. Waugh, International Terrorism: How Nations Respond to Terrorists (Documentary Publications Salisbury, NC, 1982)
R. Alcala, M.J. Gacto, F. Herrera, A fast and scalable multiobjective genetic fuzzy system for linguistic fuzzy modeling in high-dimensional regression problems. IEEE Trans. Fuzzy Syst. 19(4), 666–681 (2011)
J. Mostafa, S. Mukhopadhyay, M. Palakal, W. Lam, A multilevel approach to intelligent information filtering: model, system, and evaluation. ACM Trans. Inf. Syst. (TOIS) 15(4), 368–399 (1997)
U. Kaymak , R. Babuska, Compatible cluster merging for fuzzy modeling, in Proceedings of the FUZZ-IEEE/IFES95 (1995), pp. 897–904
B. Song, R. Marks, S. Oh, P. Arabshahi, T. Caudell, J. Choi, et al., Adaptive membership function fusion and annihilation in fuzzy if-then rules, in Second IEEE International Conference on Fuzzy Systems (IEEE, 1993), pp. 961–967
C. Sun, Rule-base structure identification in an adaptive-network-based fuzzy inference system. IEEE Trans. Fuzzy Syst. 2(1), 64–73 (1994)
B. John Garrick, J.E. Hall, M. Kilger, J.C. McDonald, T. O’Toole, P.S. Probst, E. Rindskopf Parker, R. Rosenthal, A.W. Trivelpiece, L.A. Van Arsdale, et al., Confronting the risks of terrorism: making the right decisions. Reliab. Eng. Syst. Saf. 86(2), 129–176 (2004)
M. Sugeno, G. Kang, Fuzzy modeling and control of multilayer incinerator. Fuzzy Sets Syst. 18, 329–346 (1986)
M. Sugeno, I. Hirano, S. Nakamura, S. Kotsu, Development of an intelligent unmanned helicopter, in Proceedings of International Conference on Fuzzy Systems, vol. 5 (IEEE, 1995), pp. 33–34
M. Sugeno, G. Kang, Structure identification of fuzzy model. Fuzzy Sets Syst. 28(1), 15–33 (1988)
L.T. Kóczy, K. Hirota, L. Muresan, Interpolation in hierarchical fuzzy rule bases, in Proceedings of International Conference on Fuzzy Systems (2000), pp. 471–477
L.T. Kóczy, K. Hirota, L. Muresan, Backward fuzzy rule interpolation. IEEE Trans. Fuzzy Syst. 22(6), 1682–1698 (2014)
Z. Huang, Q. Shen, Fuzzy interpolative reasoning via scale and move transformations. IEEE Trans. Fuzzy Syst. 14(2), 340–359 (2006)
Z. Huang, Q. Shen, Fuzzy interpolation and extrapolation: a practical approach. IEEE Trans. Fuzzy Syst. 16(1), 13–28 (2008)
S. Jin, R. Diao, C. Quek, Q. Shen, Backward fuzzy rule interpolation with multiple missing values, in Proceedings of IEEE International Conference on Fuzzy Systems (2013), pp. 1–8
S. Jin, R. Diao, C. Quek, Q. Shen, Backward fuzzy interpolation and extrapolation with multiple multi-antecedent rules, in Proceedings of IEEE International Conference on Fuzzy Systems (2012), pp. 1170–1177
S. Atran, Genesis of suicide terrorism. Science 299(5612), 1534–1539 (2003)
R.A. Pape, The strategic logic of suicide terrorism. Am. Polit. Sci. Rev. 97(3), 343–361 (2003)
W.L. Perry, C. Berrebi, R.A. Brown, J. Hollywood, A. Jaycocks, P. Roshan, T. Sullivan, L. Miyashiro, Predicting Suicide Attacks: Integrating Spatial, Temporal and Social Features of Terrorist Attack Targets (RAND Corporation, Santa Monica, CA, 2013)
R. Caruso, E. Gavrilova, Youth unemployment, terrorism and political violence, evidence from the israeli/palestinian conflict. Peace Econ. Peace Sci. Publ. Policy 18(2) (2012)
E.B. De Mesquita, The quality of terror. Am. J. Polit. Sci. 49(3), 515–530 (2005)
D. Fromkin, The strategy of terrorism. Foreign Aff. 53(4), 683–698 (1975)
A.B. Krueger, J. Maleckova, Education, poverty and terrorism: is there a causal connection. J. Econ. Perspect. 17(4), 119–144 (2003)
G. LaFree, L. Dugan, Introducing the global terrorism database. Terror. Polit. Violence 19(2), 181–204 (2007)
M.A. Sutton, O. Oenema, J.W. Erisman, A. Leip, H. van Grinsven, W. Winiwarter, Too much of a good thing. Nature 472(7342), 159–161 (2011)
B.P. Bryant, R.J. Lempert, Thinking inside the box: a participatory, computer-assisted approach to scenario discovery. Technol. Forecast. Soc. Change 77(1), 34–49 (2010)
V.A. Epanechnikov, Non-parametric estimation of a multivariate probability density. Theory Probab. Appl. 14(1), 153–158 (1969)
K. H, B.F. Walter, The strategies of terrorism. Int. Secur. 31(1), 49–80 (2006)
L. Huddy, S. Feldman, C. Taber, G. Lahav, Threat, anxiety, and support of antiterrorism policies. Am. J. Polit. Sci. 49(3), 593–608 (2005)
E. Bueno de Mesquita, E.S. Dickson, The propaganda of the deed: Terrorism, counterterrorismand mobilization. Am. J. Polit. Sci. 51(2), 364–381 (2007)
K. Gaibulloev, T. Sandler, Hostage taking: determinants of terrorist logistical and negotiation success. J. Peace Res. 46(6), 739–756 (2009)
M. Hughes, Terror and negotiation. Terror. Polit. Violence 2(1), 72–825 (1990)
V.A. Kremenyuk, G.-O. Faure, International Negotiation: Analysis, Approaches, Issues (Jossey-Bass San Francisco, California, 2002)
E. Pronin, K. Kennedy, S. Butsch, Bombing versus negotiating: how preferences for combating terrorism are affected by perceived terrorist rationality. Basic Appl. Soc. Psychol. 28(4), 385–392 (2006)
D.G. Pruitt, Negotiation with terrorists. Int. Negot. 11(2), 371–394 (2006)
B.I. Spector, Negotiating with villains revisited: research note. Int. Negot. 8(3), 613–621 (2003)
I.W. Zartman, Negotiating with terrorists. Int. Negot. 8(3), 443–450 (2003)
N.A. Bapat, State bargaining with transnational terrorist groups. Int. Stud. Q. 50(1), 213–230 (2006)
T. Sandler et al., Terrorism & game theory. Simul. Gaming 34(3), 319–337 (2003)
T. Boongoen, Q. Shen, C. Price, Disclosing false identity through hybrid link analysis. Artif. Intell. Law 18(1), 77–102 (2010)
T. Boongoen, Q. Shen, Nearest-neighbor guided evaluation of data reliability and its applications. IEEE Trans. Syst. Man Cybern. 40(6), 1622–1633 (2010)
X. Fu, T. Boongoen, Q. Shen, Evidence directed generation of plausible crime scenarios with identity resolution. Appl. Artif. Intell. 24(4), 253–276 (2010)
R.J. Brym, B. Araj, Are suicide bombers suicidal? Stud. Confl. Terror. 35(6), 432–443 (2012)
A. Merari, I. Diamant, A. Bibi, Y. Broshi, G. Zakin, Personality characteristics of self martyrs/suicide bombers and organizers of suicide attacks. Terror. Polit. Violence 22(1), 87–101 (2009)
L. Miller, The terrorist mind II. typologies, psychopathologies, and practical guidelines for investigation. Int. J. Offender Ther. Comp. Criminol. 50(3), 255–268 (2006)
A. Lankford, Could suicide terrorists actually be suicidal? Stud. Confl. Terror. 34(4), 337–366 (2011)
H.V. Savitch, An anatomy of urban terror: lessons from jerusalem and elsewhere. Urb. Stud. 42(3), 361–395 (2005)
H.A. Hagras, A hierarchical type-2 fuzzy logic control architecture for autonomous mobile robots. IEEE Trans. Fuzzy Syst. 12(4), 524–539 (2004)
Z.-Q. Liu, R. Satur, Contextual fuzzy cognitive map for decision support in geographic information systems. IEEE Trans. Fuzzy Syst. 7(5), 495–507 (1999)
R. Diao, Q. Shen, Feature selection with harmony search. IEEE Trans. B Syst. Man Cybern. 42(6), 1509–1523 (2012)
R. Diao, Q. Shen, New approaches to fuzzy-rough feature selection. IEEE Trans. Fuzzy Syst. 17(4), 824–838 (2009)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Jin, S., Shen, Q., Peng, J. (2019). Application: Terrorism Risk Assessment Using BFRI. In: Backward Fuzzy Rule Interpolation. Springer, Singapore. https://doi.org/10.1007/978-981-13-1654-8_7
Download citation
DOI: https://doi.org/10.1007/978-981-13-1654-8_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1653-1
Online ISBN: 978-981-13-1654-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)