IDEAS home Printed from https://ideas.repec.org/a/spr/jcsosc/v2y2019i2d10.1007_s42001-019-00046-8.html
   My bibliography  Save this article

Pairwise similarity of jihadist groups in target and weapon transitions

Author

Listed:
  • Gian Maria Campedelli

    (Transcrime-Università Cattolica del Sacro Cuore)

  • Mihovil Bartulovic

    (Carnegie Mellon University, CASOS)

  • Kathleen M. Carley

    (Transcrime-Università Cattolica del Sacro Cuore)

Abstract

Tactical decisions made by jihadist groups can have extremely negative impacts on societies. Studying the characteristics of their attacks over time is therefore crucial to extract relevant knowledge on their operational choices. In light of this, the present study employs transition networks to construct trails and analyze the behavioral patterns of the world’s five most active jihadist groups using open access data on terror attacks from 2001 to 2016. Within this frame, we propose Normalized Transition Similarity (NTS), a coefficient that captures groups’ pairwise similarity in terms of transitions between different temporally ordered sequences of states. For each group, these states respectively map attacked targets, employed weapons, and targets and weapons combined together with respect to the entire sequence of attacks. Analyses show a degree of stability of results among a number of pairs of groups across all trails. With this regard, Al Qaeda and Al Shabaab exhibit the highest NTS scores, while the Taliban and Al Qaeda prove to be the most different groups overall. Finally, potential policy implications and future work directions are also discussed.

Suggested Citation

  • Gian Maria Campedelli & Mihovil Bartulovic & Kathleen M. Carley, 2019. "Pairwise similarity of jihadist groups in target and weapon transitions," Journal of Computational Social Science, Springer, vol. 2(2), pages 245-270, July.
  • Handle: RePEc:spr:jcsosc:v:2:y:2019:i:2:d:10.1007_s42001-019-00046-8
    DOI: 10.1007/s42001-019-00046-8
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s42001-019-00046-8
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s42001-019-00046-8?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Patrick T. Brandt & Todd Sandler, 2010. "What Do Transnational Terrorists Target? Has It Changed? Are We Safer?," Journal of Conflict Resolution, Peace Science Society (International), vol. 54(2), pages 214-236, April.
    2. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
    3. Per Baltzer Overgaard, 1994. "The Scale of Terrorist Attacks as a Signal of Resources," Journal of Conflict Resolution, Peace Science Society (International), vol. 38(3), pages 452-478, September.
    4. Roman Loimeier, 2012. "Boko Haram: The Development of a Militant Religious Movement in Nigeria," Africa Spectrum, Institute of African Affairs, GIGA German Institute of Global and Area Studies, Hamburg, vol. 47(2-3), pages 137-155.
    5. Institute for Economics and Peace, 2017. "Global Peace Index 2017," Working Papers id:11991, eSocialSciences.
    6. Charlinda Santifort & Todd Sandler & Patrick T Brandt, 2013. "Terrorist attack and target diversity," Journal of Peace Research, Peace Research Institute Oslo, vol. 50(1), pages 75-90, January.
    7. James L. Regens & Nick Mould & Elizabeth Vernon & Amanda Montgomery, 2016. "Operational Dynamics of Boko Haram's Terrorist Campaign Following Leadership Succession," Social Science Quarterly, Southwestern Social Science Association, vol. 97(1), pages 44-52, March.
    8. Wisdom Oghosa Iyekekpolo, 2016. "Boko Haram: understanding the context," Third World Quarterly, Taylor & Francis Journals, vol. 37(12), pages 2211-2228, December.
    9. Sandler, Todd & Lapan, Harvey E., 1988. "The Calculus of Dissent: An Analysis of Terrorists' Choice of Targets," Staff General Research Papers Archive 10818, Iowa State University, Department of Economics.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Rehman, Faiz Ur & Nasir, Muhammad & Shahbaz, Muhammad, 2017. "What have we learned? Assessing the effectiveness of counterterrorism strategies in Pakistan," Economic Modelling, Elsevier, vol. 64(C), pages 487-495.
    2. Subhayu Bandyopadhyay & Todd Sandler, 2023. "The Trade-Offs of Counterterrorism Policies," Review, Federal Reserve Bank of St. Louis, vol. 105(3), pages 177-197, July.
    3. Todd Sandler, 2010. "Terrorism and Policy: Introduction," Journal of Conflict Resolution, Peace Science Society (International), vol. 54(2), pages 203-213, April.
    4. Timothy Mathews & Anton D. Lowenberg, 2012. "The Interdependence Between Homeland Security Efforts of a State and a Terrorist’s Choice of Attack," Conflict Management and Peace Science, Peace Science Society (International), vol. 29(2), pages 195-218, April.
    5. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
    6. Bandyopadhyay, Subhayu & Sandler, Todd, 2021. "Counterterrorism policy: Spillovers, regime solidity, and corner solutions," Journal of Economic Behavior & Organization, Elsevier, vol. 188(C), pages 811-827.
    7. Yang Jiao & Zijun Luo, 2019. "A model of terrorism and counterterrorism with location choices," Public Choice, Springer, vol. 179(3), pages 301-313, June.
    8. Peiqiu Guan & Jun Zhuang, 2016. "Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 776-791, April.
    9. Aaron Clauset & Maxwell Young & Kristian Skrede Gleditsch, 2007. "On the Frequency of Severe Terrorist Events," Journal of Conflict Resolution, Peace Science Society (International), vol. 51(1), pages 58-87, February.
    10. Marco Alfano & Joseph‐Simon Görlach, 2024. "Terrorism and education: Evidence from instrumental variables estimators," Journal of Applied Econometrics, John Wiley & Sons, Ltd., vol. 39(5), pages 906-925, August.
    11. Todd Sandler, 2013. "Introduction: Advances in the Study of the Economics of Terrorism," Southern Economic Journal, John Wiley & Sons, vol. 79(4), pages 768-773, April.
    12. Bakker, Craig & Webster, Jennifer B. & Nowak, Kathleen E. & Chatterjee, Samrat & Perkins, Casey J. & Brigantic, Robert, 2020. "Multi-Game Modeling for Counter-Smuggling," Reliability Engineering and System Safety, Elsevier, vol. 200(C).
    13. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Voluntary participation in a terror group and counterterrorism policy," Journal of Economic Behavior & Organization, Elsevier, vol. 215(C), pages 500-513.
    14. Zhang, Jing & Zhuang, Jun & Jose, Victor Richmond R., 2018. "The role of risk preferences in a multi-target defender-attacker resource allocation game," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 95-104.
    15. Timothy Mathews & Aniruddha Bagchi & João Ricardo Faria, 2019. "Simple analytics of the impact of terror generation on attacker–defender interactions," Public Choice, Springer, vol. 179(3), pages 287-299, June.
    16. Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 24(3), pages 23-44.
    17. Musegaas, Marieke & Schlicher, Loe & Blok, Herman, 2022. "Stackelberg production-protection games: Defending crop production against intentional attacks," European Journal of Operational Research, Elsevier, vol. 297(1), pages 102-119.
    18. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Politically influenced counterterrorism policy and welfare efficiency," European Journal of Political Economy, Elsevier, vol. 76(C).
    19. Daniel G. Arce M. & Todd Sandler, 2005. "Counterterrorism," Journal of Conflict Resolution, Peace Science Society (International), vol. 49(2), pages 183-200, April.
    20. Jenelius, Erik & Westin, Jonas & Holmgren, Åke J., 2010. "Critical infrastructure protection under imperfect attacker perception," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(1), pages 16-26.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:jcsosc:v:2:y:2019:i:2:d:10.1007_s42001-019-00046-8. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.