Pairwise similarity of jihadist groups in target and weapon transitions
Author
Abstract
Suggested Citation
DOI: 10.1007/s42001-019-00046-8
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Patrick T. Brandt & Todd Sandler, 2010. "What Do Transnational Terrorists Target? Has It Changed? Are We Safer?," Journal of Conflict Resolution, Peace Science Society (International), vol. 54(2), pages 214-236, April.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007.
"Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker,"
Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2006. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Levine's Bibliography 321307000000000158, UCLA Department of Economics.
- Per Baltzer Overgaard, 1994. "The Scale of Terrorist Attacks as a Signal of Resources," Journal of Conflict Resolution, Peace Science Society (International), vol. 38(3), pages 452-478, September.
- Roman Loimeier, 2012. "Boko Haram: The Development of a Militant Religious Movement in Nigeria," Africa Spectrum, Institute of African Affairs, GIGA German Institute of Global and Area Studies, Hamburg, vol. 47(2-3), pages 137-155.
- Institute for Economics and Peace, 2017. "Global Peace Index 2017," Working Papers id:11991, eSocialSciences.
- Charlinda Santifort & Todd Sandler & Patrick T Brandt, 2013. "Terrorist attack and target diversity," Journal of Peace Research, Peace Research Institute Oslo, vol. 50(1), pages 75-90, January.
- James L. Regens & Nick Mould & Elizabeth Vernon & Amanda Montgomery, 2016. "Operational Dynamics of Boko Haram's Terrorist Campaign Following Leadership Succession," Social Science Quarterly, Southwestern Social Science Association, vol. 97(1), pages 44-52, March.
- Wisdom Oghosa Iyekekpolo, 2016. "Boko Haram: understanding the context," Third World Quarterly, Taylor & Francis Journals, vol. 37(12), pages 2211-2228, December.
- Sandler, Todd & Lapan, Harvey E., 1988. "The Calculus of Dissent: An Analysis of Terrorists' Choice of Targets," Staff General Research Papers Archive 10818, Iowa State University, Department of Economics.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Rehman, Faiz Ur & Nasir, Muhammad & Shahbaz, Muhammad, 2017.
"What have we learned? Assessing the effectiveness of counterterrorism strategies in Pakistan,"
Economic Modelling, Elsevier, vol. 64(C), pages 487-495.
- Rehman, Faiz Ur & Nasir, Muhammad & Shahbaz, Muhammad, 2017. "What Have We Learned? Assessing the Effectiveness of Counterterrorism Strategies in Pakistan," MPRA Paper 77015, University Library of Munich, Germany, revised 20 Feb 2017.
- Subhayu Bandyopadhyay & Todd Sandler, 2023. "The Trade-Offs of Counterterrorism Policies," Review, Federal Reserve Bank of St. Louis, vol. 105(3), pages 177-197, July.
- Todd Sandler, 2010. "Terrorism and Policy: Introduction," Journal of Conflict Resolution, Peace Science Society (International), vol. 54(2), pages 203-213, April.
- Timothy Mathews & Anton D. Lowenberg, 2012. "The Interdependence Between Homeland Security Efforts of a State and a Terrorist’s Choice of Attack," Conflict Management and Peace Science, Peace Science Society (International), vol. 29(2), pages 195-218, April.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007.
"Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker,"
Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2006. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Levine's Bibliography 321307000000000158, UCLA Department of Economics.
- Bandyopadhyay, Subhayu & Sandler, Todd, 2021. "Counterterrorism policy: Spillovers, regime solidity, and corner solutions," Journal of Economic Behavior & Organization, Elsevier, vol. 188(C), pages 811-827.
- Yang Jiao & Zijun Luo, 2019. "A model of terrorism and counterterrorism with location choices," Public Choice, Springer, vol. 179(3), pages 301-313, June.
- Peiqiu Guan & Jun Zhuang, 2016. "Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 776-791, April.
- Aaron Clauset & Maxwell Young & Kristian Skrede Gleditsch, 2007. "On the Frequency of Severe Terrorist Events," Journal of Conflict Resolution, Peace Science Society (International), vol. 51(1), pages 58-87, February.
- Marco Alfano & Joseph‐Simon Görlach, 2024. "Terrorism and education: Evidence from instrumental variables estimators," Journal of Applied Econometrics, John Wiley & Sons, Ltd., vol. 39(5), pages 906-925, August.
- Todd Sandler, 2013. "Introduction: Advances in the Study of the Economics of Terrorism," Southern Economic Journal, John Wiley & Sons, vol. 79(4), pages 768-773, April.
- Bakker, Craig & Webster, Jennifer B. & Nowak, Kathleen E. & Chatterjee, Samrat & Perkins, Casey J. & Brigantic, Robert, 2020. "Multi-Game Modeling for Counter-Smuggling," Reliability Engineering and System Safety, Elsevier, vol. 200(C).
- Bandyopadhyay, Subhayu & Sandler, Todd, 2023.
"Voluntary participation in a terror group and counterterrorism policy,"
Journal of Economic Behavior & Organization, Elsevier, vol. 215(C), pages 500-513.
- Subhayu Bandyopadhyay & Todd Sandler, 2022. "Voluntary participation in a terror group and counterterrorism policy," Working Papers 2022-023, Federal Reserve Bank of St. Louis.
- Zhang, Jing & Zhuang, Jun & Jose, Victor Richmond R., 2018. "The role of risk preferences in a multi-target defender-attacker resource allocation game," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 95-104.
- Timothy Mathews & Aniruddha Bagchi & João Ricardo Faria, 2019. "Simple analytics of the impact of terror generation on attacker–defender interactions," Public Choice, Springer, vol. 179(3), pages 287-299, June.
- Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 24(3), pages 23-44.
- Musegaas, Marieke & Schlicher, Loe & Blok, Herman, 2022. "Stackelberg production-protection games: Defending crop production against intentional attacks," European Journal of Operational Research, Elsevier, vol. 297(1), pages 102-119.
- Bandyopadhyay, Subhayu & Sandler, Todd, 2023.
"Politically influenced counterterrorism policy and welfare efficiency,"
European Journal of Political Economy, Elsevier, vol. 76(C).
- Subhayu Bandyopadhyay & Todd Sandler, 2022. "Politically influenced counterterrorism policy and welfare efficiency," Working Papers 2022-007, Federal Reserve Bank of St. Louis.
- Daniel G. Arce M. & Todd Sandler, 2005. "Counterterrorism," Journal of Conflict Resolution, Peace Science Society (International), vol. 49(2), pages 183-200, April.
- Jenelius, Erik & Westin, Jonas & Holmgren, Åke J., 2010. "Critical infrastructure protection under imperfect attacker perception," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(1), pages 16-26.
More about this item
Keywords
Transition networks; Terrorism; Normalized transition similarity; Event sequences; Security;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:jcsosc:v:2:y:2019:i:2:d:10.1007_s42001-019-00046-8. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.