Search
Profile

Ask your question

Close

What Is Terrorism Data?

In essence, terrorism is the use of violence and intimidation to acheive ideological ends. However, collecting and analyzing terrorism data is complicated by the fact that there is no universal definition of terrorism. For example, some organizations define it as violence against civilians only; others define it as violence perpretrated by “non-state actors.”

Where Does Terrorism Data Come From?

The Global Terrorism Database (GTD) out of the University of Michigan is one of the most widely-used sources of terrorism data. Other academic institutions provide terrorism data, as well, as do multi-national organizations like the UN, NGOs, private think tanks, and governments. However, since terrorist organizations generally have a goal they want to impress upon a population, theoretically anyone can collect terrorism data by following the news and publications by terrorist organizations.

Terrorist organizations themselves also contribute a good amount of data, especially on recruitment and motive.

What Types of Columns/Attributes Should I Expect When Working with This Data?

Terrorism data may be available in the form sf maps, charts, tables, and more. It may include number of deaths per year per country, number of incidents per year per country, type of incident, and whether the incidents were foreign (transnational), domestic, or both.

Additional terrorism data attributes include public concern and fear of terrorism, media coverage, and public policy changes related to/following terror incidents.

What Is Terrorism Data Used For?

The primary use of this data is to understand the motivations behind terror in order to prevent, predict, and respond to it. Part of this response includes efforts to de-radicalize individuals.

Naturally, certain organizations focus on some uses of the data more than others. Security and law enforcement, for example, focus on the security breaches that terrorists exploit to perpetrate acts of violence. First responders focus on reacting to and defusing violent situations in real time. Outreach programs concern themselves with de-radicalization. And, finally, politicians use the data to craft public policy informed by real information rather than fear.

Terrorist organizations may also use the data as inspiration or a guideline for future acts.

How Should I Test the Quality of This Data?

The first step toward building a quality terrorism data set is defining terror. Once done, you can use data from any resource but keep in mind that their definition may not match yours.

Interesting Case Studies and Blogs to Look Into

Our World in Data: Terrorism
DISE, Ben-Gurion University of the Negev: Using Data Mining Techniques for Detecting Terror-Related Activities on the Web

Tangible Examples of Impact

Key to the problem of assessing the effectiveness of assassination is the problem of measurement: For obvious reasons, it’s hard to assign an objective, long-term value to the assassination of terrorists like al-Qaeda’s Anwar al-Awlaki or Osama Bin Laden. There is, for example, copious evidence that while al-Qaeda’s central leadership was hollowed out by CIA targeted assassinations, the organisation has reinvented itself and today enjoys significantly enhanced reach in Afghanistan, Pakistan and West Africa.

Moneycontrol: Does Israel’s assassination culture actually help fight terrorists and rogue states?

Connected Datasets

Caci CORIAN Family of Systems

by caci-logo

CORIAN Family of Systems accurately and reliably detects, classifies, tracks, and defeats unmanned aircraft system threats.

0 (0)   Reviews (0)

APIVoid ThreatLog API

by APIVoid

APIVoid ThreatLog API enables querying of malicious websites in real-time.

0 (0)   Reviews (0)

African Financial & Economic Data Country Profile

by AFED logo

African Financial & Economic Data Country Profile provides insights on any country in Africa.

0 (0)   Reviews (0)