IDEAS home Printed from https://ideas.repec.org/a/gam/jsusta/v11y2019i5p1487-d212928.html
   My bibliography  Save this article

Quantitative Research on Global Terrorist Attacks and Terrorist Attack Classification

Author

Listed:
  • Xueli Hu

    (State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 45000, China)

  • Fujun Lai

    (Chinese Academy of Finance and Development, Central University of Finance and Economics, Beijing 100081, China)

  • Gufan Chen

    (Faculty of Applied Science, University of Regina, Regina, SK S4S0A2, Canada)

  • Rongcheng Zou

    (School of Automation, Northwestern Polytechnical University, Xi’an 710072, China)

  • Qingxiang Feng

    (Institute of Guangdong Hong Kong and Macao Development Studies, Sun Yat-sen University, Guangzhou 510275, China)

Abstract

Terrorist attacks are events which hinder the development of a region. Before the terrorist attacks, we need to conduct a graded evaluation of the terrorist attacks. After getting the level of terrorist attacks, we can fight terrorist organizations more effectively. This paper builds rating models for terrorist attacks, hidden or emerging terrorist organization classification discovery models, terrorist organization alliance network models and more, through quantitative research of the Global Terrorism Database, which solved the event classification. Through studying relevant literature and the variables of the Global Terrorism Database, this paper sorted out 25 observation variables related to the impact level (level of harm) of terrorist attacks. By establishing a mathematical model of factor analysis, 11 factors related to the impact level (level of harm) of terrorist attacks were constructed, and the variance of the contribution of each factor was used as the weight to calculate the comprehensive rate of the impact level of each terrorist attack. Finally, K -means clustering method is used to cluster and analyze the comprehensive rate of impact level, and the top 10 terrorist attacks with the highest impact level in the past two decades were obtained.

Suggested Citation

  • Xueli Hu & Fujun Lai & Gufan Chen & Rongcheng Zou & Qingxiang Feng, 2019. "Quantitative Research on Global Terrorist Attacks and Terrorist Attack Classification," Sustainability, MDPI, vol. 11(5), pages 1-16, March.
  • Handle: RePEc:gam:jsusta:v:11:y:2019:i:5:p:1487-:d:212928
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2071-1050/11/5/1487/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2071-1050/11/5/1487/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Keohane, Nathaniel O & Zeckhauser, Richard J, 2003. "The Ecology of Terror Defense," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 201-229, March-May.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Zhongbei Li & Xiangchun Li & Chen Dong & Fanfan Guo & Fan Zhang & Qi Zhang, 2021. "Quantitative Analysis of Global Terrorist Attacks Based on the Global Terrorism Database," Sustainability, MDPI, vol. 13(14), pages 1-19, July.
    2. Radomír Scurek, 2021. "Management and Data Processing of Quantitative Terrorism Research in the European Union and the Czech Republic," European Research Studies Journal, European Research Studies Journal, vol. 0(Special 4), pages 18-39.
    3. Muhammad Athar Nadeem & Zhiying Liu & Haji Suleman Ali & Amna Younis & Muhammad Bilal & Yi Xu, 2020. "Innovation and Sustainable Development: Does Aid and Political Instability Impede Innovation?," SAGE Open, , vol. 10(4), pages 21582440209, November.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
    2. A. J. Novak & G. Feichtinger & G. Leitmann, 2010. "A Differential Game Related to Terrorism: Nash and Stackelberg Strategies," Journal of Optimization Theory and Applications, Springer, vol. 144(3), pages 533-555, March.
    3. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    4. John K. Stranlund & Barry C. Field, 2006. "On the Production of Homeland Security Under True Uncertainty," Working Papers 2006-5, University of Massachusetts Amherst, Department of Resource Economics.
    5. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    6. Geoffrey Heal & Howard Kunreuther, 2003. "You Only Die Once: Managing Discrete Interdependent Risks," NBER Working Papers 9885, National Bureau of Economic Research, Inc.
    7. Lakdawalla, Darius & Zanjani, George, 2005. "Insurance, self-protection, and the economics of terrorism," Journal of Public Economics, Elsevier, vol. 89(9-10), pages 1891-1905, September.
    8. Jonathan S. Feinstein & Edward H. Kaplan, 2010. "Analysis of a Strategic Terror Organization," Journal of Conflict Resolution, Peace Science Society (International), vol. 54(2), pages 281-302, April.
    9. Bertrand Crettez & Naila Hayek, 2014. "Terrorists’ Eradication Versus Perpetual Terror War," Journal of Optimization Theory and Applications, Springer, vol. 160(2), pages 679-702, February.
    10. Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
    11. Howard C. Kunreuther & Erwann O. Michel-Kerjan, 2007. "Evaluating The Effectiveness of Terrorism Risk Financing Solutions," NBER Working Papers 13359, National Bureau of Economic Research, Inc.
    12. Steiner, Lasse & Frey, Bruno S., 2012. "Correcting the Imbalances of the World Heritage List," EBLA Working Papers 201206, University of Turin.
    13. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    14. Marco Pelliccia, 2020. "Decentralized Defence of a (Directed) Network Structure," Defence and Peace Economics, Taylor & Francis Journals, vol. 31(6), pages 659-676, August.
    15. Vicki Bier & Kjell Hausken, 2011. "Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures," Annals of Operations Research, Springer, vol. 186(1), pages 39-59, June.
    16. Geoffrey Heal & Howard Kunreuther, 2007. "Modeling Interdependent Risks," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 621-634, June.
    17. Louis Anthony Cox, Jr, 2009. "Improving Risk‐Based Decision Making for Terrorism Applications," Risk Analysis, John Wiley & Sons, vol. 29(3), pages 336-341, March.
    18. Peiqiu Guan & Jun Zhuang, 2015. "Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models," Decision Analysis, INFORMS, vol. 12(4), pages 173-189, December.
    19. Paulson, Elisabeth C. & Linkov, Igor & Keisler, Jeffrey M., 2016. "A game theoretic model for resource allocation among countermeasures with multiple attributes," European Journal of Operational Research, Elsevier, vol. 252(2), pages 610-622.
    20. Edward H. Kaplan & Alex Mintz & Shaul Mishal, 2006. "Tactical Prevention of Suicide Bombings in Israel," Interfaces, INFORMS, vol. 36(6), pages 553-561, December.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jsusta:v:11:y:2019:i:5:p:1487-:d:212928. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.