Knowledge Extraction on the Nexus Between Terrorism Criteria and Attacks on Private Citizens and Property

Knowledge Extraction on the Nexus Between Terrorism Criteria and Attacks on Private Citizens and Property

Donald Douglas Atsa'am, Ruth Wario
Copyright: © 2021 |Pages: 11
DOI: 10.4018/IJCWT.2021010102
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This study extracted knowledge on the association between terrorism inclusion criteria and one of the terrorism target/victim types known as “private citizens and property.” Three criteria determine what constitutes a terror attack: Criterion 1: the action is done with intention to attain a political, economic, religious, or social goal; Criterion 2: the action is done with the intention to coerce, intimidate or publicize to larger audience(s); Criterion 3: the action is outside international humanitarian law. Literally, all terror incidents satify Criterion 3. As for Criteria 1 and 2, the odds ratio was deployed on the global terrorism database, consisting of 170,350 records of terrorist attack incidents, to evaluate the nexus between each of these criteria and terror attacks on private citizens and property. The results showed that any terror attack on private citizens and property is 2.2 times more likely to have been perpetrated by a terror group in order to achieve Criterion 2 than to achieve Criterion 1. The implications of the outcome in counterterrorism are discussed.
Article Preview
Top

Introduction

Knowledge extraction is an aspect of data mining that seeks to discover hidden knowledge from both structured and unstructured data sources. This study deploys data mining techniques to extract knowledge on the association between the terrorism inclusion criteria and one of the terrorism target/victim types known as “private citizens and property”. The Global Terrorism Database (GTD) maintained by the National Consortium for the Study of Terrorism and Responses to Terrorism (START) defines a terrorist attack as the illegal use of force and violence by an actor (usually non-state actor) to coerce, intimidate, and instill fear in order to achieve goals that are political, social, economic, or religious in nature (START, 2017). Miller (2017) identified six categories of terrorism on the basis of ideological motivations. The categories include left-wing extremism, environmental extremism, right-wing extremism, religious extremism, nationalist/separatist extremism, and single-issue extremism. The left-wing terrorists perpetrate violence with the aim of ensuring that the ‘highly-placed’ in the society do not lord it over the ‘lowly-placed’. The actors of environmental extremism carry out violence in support of the belief that the environment, including plants and animals, need to be protected from destruction resulting from human activities. The right-wing extremism entails violence aimed at promoting nationalist, fascist, or ethnic supremacy. Religious extremism is a form of terrorism by which violence is perpetrated to project faith-based ideologies, views and practices. The nationalist/separatist terrorists carry out violent attacks in order to enforce and or preserve ethnic or geo-political identity and self-determination. On the other hand, the single-issue terrorists engage in violence with the aim of projecting a specific, often minute, cause which may have a political undertone. Hamelin et al. (2010) examined the factors that trigger individuals to engage in terrorism using Morocco as a case study. According to Hamelin et al. (2010), individuals transit along three states in order to become established terrorists. The initial state is known as the “doing nothing state”; and the factors that trigger an individual to transit to the second state, the “protesting peacefully state”, are newspaper news, worldwide events, perceived poverty, income, and level of education of an individual. From the “protesting peacefully state”, individuals transit to the “armed resistance state” as established terrorists. The factors that trigger the shift from the second state to the last state are friends’ influence, low trust in government, level of education and household size (Hamelin et al., 2010).

Some studies have leveraged on the geographic area of attacks and operations to categorize terror groups (Nance, 2008; Oyelere et al., 2018). These categories include local terrorists who operate within a district, town or city; regional terrorists whose operations encompass a number of cities, states or regions within the same country. Other categories include national terrorists who operate in most or all states of a country; transnational terrorists who operate across multiple national boundaries and international terror groups who operate in many countries and continents (Nance, 2008; Oyelere et al., 2018).

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024)
Volume 13: 1 Issue (2023)
Volume 12: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing