International Terrorism: Attributes of Terrorist Events

Last updated

The International Terrorism: Attributes of Terrorist Events project, commonly known as ITERATE, records data regarding transnational terrorist groups and their activities. It is one of the most comprehensive databases of its type; most academic research in the field stems from either ITERATE or the Global Terrorism Database. [1] Published by Vinyard Software, it is available as a qualitative textual chronology from 1960–present and a quantitative numerically coded database from 1968–present. [1] [2]

Contents

Data

The quantitative data set contains one main file and three complementary files. The main file ("Common File") is the most extensive, recording 42 different variables such as location, type of attack, perpetrator(s), and casualties. The "Fate File" records 14 variables relating to the fate of the terrorist group(s) involved where at least one failed to escape. The "Hostage File" records 41 variables specific to events involving hostage-taking. The "Skyjack File" records 27 variables specific to instances of skyjacking. The files are designed to be used together with almost all incidents recorded in the Common File and supplementary variables recorded where appropriate. [1] [2] [3] [4]

The qualitative file provides a textual account of each incident. All files in both qualitative and quantitative data sets utilize the same incident codes for cross-referencing. [2] [4]

Each data set is updated daily. [2] [4]

ITERATE predominately utilises open-source data collection such as academic research and media articles. [2] [5] It also uses intelligence from government agencies as well as interviews with academics, government officials, and victims [4]

History

ITERATE was originally created by CIA analyst Dr Edward Mickolus who co-founded Vinyard Software, ITERATE's publisher, with Dr Calvin Andrus. [6] [7]

Strengths and Limitations

Definition of terrorism

The definition of terrorism used by ITERATE differs to that used by other databases. This is not unique to ITERATE as all 5 of the most prominent terrorism databases utilize their own definition. [8] ITERATE defines terrorism as:

"...the use, or threat of use, of anxiety-inducing, extra-normal violence for political purposes by any individual or group, whether acting for or in opposition to established governmental authority, when such action is intended to influence the attitudes and behavior of a target group wider than the immediate victims and when, through the nationality or foreign ties of its perpetrators, its location, the nature of its institutional or human victims, or the mechanics of its resolution, its ramifications transcend national boundaries." [3]

ITERATE does not record instances of domestic terrorism, focusing exclusively on international/transnational terrorism, thus excluding the majority of terrorist incidents. [1] [6] It differentiates between these as follows.

"International terrorism is such action when carried out by individuals or groups controlled by a sovereign state, whereas transnational terrorism is carried out by basically autonomous non-state actors, whether or not they enjoy some degree of support from sympathetic states." [3]

That said, the same definition of terrorism has been use throughout the ITERATE project avoiding inconsistencies in data recording, unlike several other databases. [8]

Open-source data collection

The use of open-source data collection methods has both pros and cons: [5]

Data on Terrorist Subjects (DOTS) Database

The Data on Terrorist Subjects (DOTS) Database was later introduced to supplement ITERATE. It contains biographical information on every terrorist and person of interest included in ITERATE. [2]

Further reading

A list of publications that have utilized ITERATE can be found here.

  1. 1 2 3 4 LaFree, Gary (2019-03-14). Chenoweth, Erica; English, Richard; Gofas, Andreas; Kalyvas, Stathis N (eds.). "The Evolution of Terrorism Event Databases". The Oxford Handbook of Terrorism. pp. 49–68. doi:10.1093/oxfordhb/9780198732914.013.3. ISBN   978-0-19-873291-4 . Retrieved 2021-09-14.
  2. 1 2 3 4 5 6 Flemming, Peter A.; Mickolus, Edward; Sandler, Todd (2010). "Research Note: Using the ITERATE and DOTS Databases". Journal of Strategic Security. 1 (1): 57–76. doi: 10.5038/1944-0472.1.1.6 . S2CID   143171849.
  3. 1 2 3 Edward F. Mickolus; Todd Sandler; Jean M. Murdock; and Peter A. Flemming (March 2021), ITERATE Data Codebook (PDF), retrieved 2021-09-14{{citation}}: CS1 maint: multiple names: authors list (link)
  4. 1 2 3 4 "Databases on Terrorism". The Routledge Handbook of Terrorism Research. Routledge. 2011-02-25. pp. 312–358. doi:10.4324/9780203828731-17. ISBN   978-0-203-82873-1.
  5. 1 2 Dugan, Laura; Distler, Michael (2016), "Measuring Terrorism", The Handbook of the Criminology of Terrorism, John Wiley & Sons, Ltd, pp. 187–205, doi:10.1002/9781118923986.ch12, ISBN   978-1-118-92398-6 , retrieved 2021-09-14
  6. 1 2 Fowler, William Warner (March 1981), Terrorism Data Bases: A Comparison of Missions, Methods, and Systems (PDF), RAND Corporation
  7. "About Vinyard Software". www.vinyardsoftware.com. Retrieved 2021-09-15.
  8. 1 2 Sheehan, I. S. (2012). Assessing and comparing data sources for terrorism research. In Evidence-based counterterrorism policy (pp. 13-40). Springer, New York, NY. Available at https://www.researchgate.net/profile/Ivan-Sheehan/publication/226098567_Assessing_and_Comparing_Data_Sources_for_Terrorism_Research/links/5494def60cf20f487d2c48be/Assessing-and-Comparing-Data-Sources-for-Terrorism-Research.pdf

Related Research Articles

<span class="mw-page-title-main">Research</span> Systematic study undertaken to increase knowledge

Research is "creative and systematic work undertaken to increase the stock of knowledge". It involves the collection, organization and analysis of evidence to increase understanding of a topic, characterized by a particular attentiveness to controlling sources of bias and error. These activities are characterized by accounting and controlling for biases. A research project may be an expansion of past work in the field. To test the validity of instruments, procedures, or experiments, research may replicate elements of prior projects or the project as a whole.

A case study is an in-depth, detailed examination of a particular case within a real-world context. For example, case studies in medicine may focus on an individual patient or ailment; case studies in business might cover a particular firm's strategy or a broader market; similarly, case studies in politics can range from a narrow happening over time like the operations of a specific political campaign, to an enormous undertaking like world war, or more often the policy analysis of real-world problems affecting multiple stakeholders.

<span class="mw-page-title-main">Qualitative research</span> Form of research

Qualitative research is a type of research that aims to gather and analyse non-numerical (descriptive) data in order to gain an understanding of individuals' social reality, including understanding their attitudes, beliefs, and motivation. This type of research typically involves in-depth interviews, focus groups, or observations in order to collect data that is rich in detail and context. Qualitative research is often used to explore complex phenomena or to gain insight into people's experiences and perspectives on a particular topic. It is particularly useful when researchers want to understand the meaning that people attach to their experiences or when they want to uncover the underlying reasons for people's behavior. Qualitative methods include ethnography, grounded theory, discourse analysis, and interpretative phenomenological analysis. Qualitative research methods have been used in sociology, anthropology, political science, psychology, communication studies, social work, folklore, educational research, information science and software engineering research.

<span class="mw-page-title-main">Quantitative research</span> All procedures for the numerical representation of empirical facts

Quantitative research is a research strategy that focuses on quantifying the collection and analysis of data. It is formed from a deductive approach where emphasis is placed on the testing of theory, shaped by empiricist and positivist philosophies.

<span class="mw-page-title-main">Content analysis</span> Research method for studying documents and communication artifacts

Content analysis is the study of documents and communication artifacts, which might be texts of various formats, pictures, audio or video. Social scientists use content analysis to examine patterns in communication in a replicable and systematic manner. One of the key advantages of using content analysis to analyse social phenomena is their non-invasive nature, in contrast to simulating social experiences or collecting survey answers.

DSI may refer to:

<span class="mw-page-title-main">Data analysis</span> The process of analyzing data to discover useful information and support decision-making

Data analysis is the process of inspecting, cleansing, transforming, and modeling data with the goal of discovering useful information, informing conclusions, and supporting decision-making. Data analysis has multiple facets and approaches, encompassing diverse techniques under a variety of names, and is used in different business, science, and social science domains. In today's business world, data analysis plays a role in making decisions more scientific and helping businesses operate more effectively.

<span class="mw-page-title-main">Systematic review</span> Comprehensive review of research literature using systematic methods

A systematic review is a scholarly synthesis of the evidence on a clearly presented topic using critical methods to identify, define and assess research on the topic. A systematic review extracts and interprets data from published studies on the topic, then analyzes, describes, critically appraises and summarizes interpretations into a refined evidence-based conclusion. For example, a systematic review of randomized controlled trials is a way of summarizing and implementing evidence-based medicine.

<span class="mw-page-title-main">Sociology of terrorism</span> Academic field that seeks to understand terrorism

Sociology of terrorism is a field of sociology that seeks to understand terrorism as a social phenomenon. The field defines terrorism, studies why it occurs and evaluates its impacts on society. The sociology of terrorism draws from the fields of political science, history, economics and psychology. The sociology of terrorism differs from critical terrorism studies, emphasizing the social conditions that enable terrorism. It also studies how individuals as well as states respond to such events.

In the social sciences, coding is an analytical process in which data, in both quantitative form or qualitative form are categorized to facilitate analysis.

Quantitative methods provide the primary research methods for studying the distribution and causes of crime. Quantitative methods provide numerous ways to obtain data that are useful to many aspects of society. The use of quantitative methods such as survey research, field research, and evaluation research as well as others. The data can, and is often, used by criminologists and other social scientists in making causal statements about variables being researched.

The marketing research process is a six-step process involving the definition of the problem being studied upon, determining what approach to take, formulation of research design, field work entailed, data preparation and analysis, and the generation of reports, how to present these reports, and overall, how the task can be accomplished.

<span class="mw-page-title-main">RQDA</span> Qualitative data analysis tool

RQDA is an R package for computer assisted qualitative data analysis or CAQDAS. It is installable from, and runs within, the R statistical software, but has a separate window running a graphical user interface. RQDA's approach allows for tight integration of the constructivist approach of qualitative research with quantitative data analysis which can increase the rigor, transparency and validity of qualitative research.

MAXQDA is a software program designed for computer-assisted qualitative and mixed methods data, text and multimedia analysis in academic, scientific, and business institutions. It is being developed and distributed by VERBI Software based in Berlin, Germany.

The WomanStats Project is a donor-funded research and database project housed at Brigham Young University that "seeks to collect detailed statistical data on the status of women around the world, and to connect that data with data on the security of states." The WomanStats Database has the most comprehensive compilation of information on the status of women in the world. Coders comb the extant literature and conduct expert interviews to find qualitative and quantitative information on over 300 indicators of women's status in 174 countries with populations of at least 200,000. Access to the online database is free.

<span class="mw-page-title-main">Global Terrorism Index</span> Indicator for impact of terrorism

The Global Terrorism Index (GTI) is a report published annually by the Institute for Economics and Peace (IEP), and was developed by IT entrepreneur and IEP's founder Steve Killelea. The index provides a comprehensive summary of the key global trends and patterns in terrorism since 2000. It is an attempt to systematically rank the nations of the world according to terrorist activity. The index combines a number of factors associated with terrorist attacks to build an explicit picture of the impact of terrorism, illustrating trends, and providing a data series for analysis by researchers and policymakers. It produces a composite score in order to provide an ordinal ranking of countries on the impact of terrorism.

<span class="mw-page-title-main">Global Terrorism Database</span> Terrorist incident database by the University of Maryland, College Park

The Global Terrorism Database (GTD) is a database of terrorist incidents from 1970 onward. As of May 2021, the list extended through 2019 recording over 200,000 incidents, although data from 1993 is excluded. The database is maintained by the National Consortium for the Study of Terrorism and Responses to Terrorism (START) at the University of Maryland, College Park in the United States. It is also the basis for other terrorism-related measures, such as the Global Terrorism Index (GTI) published by the Institute for Economics and Peace.

<span class="mw-page-title-main">Quirkos</span> Software for qualitative data analysis

Quirkos is a CAQDAS software package for the qualitative analysis of text data, commonly used in social science. It provides a graphical interface in which the nodes or themes of analysis are represented by bubbles. It is designed primarily for new and non-academic users of qualitative data, to allow them to quickly learn the basics of qualitative data analysis. Although simpler to use, it lacks some of the features present in other commercial CAQDAS packages such as multimedia support. However, it has been proposed as a useful tool for lay and participant led analysis and is comparatively affordable. It is developed by Edinburgh, UK based Quirkos Software, and was first released in October 2014.

This glossary of computer science is a list of definitions of terms and concepts used in computer science, its sub-disciplines, and related fields, including terms relevant to software, data science, and computer programming.

<span class="mw-page-title-main">Economics of terrorism</span> Branch of economics

The economics of terrorism is a branch of economics dedicated to the study of terrorism. It involves using the tools of economic analysis to analyse issues related to terrorism, such as the link between education, poverty and terrorism, the effect of macroeconomic conditions on the frequency and quality of terrorism, the economic costs of terrorism, and the economics of counter-terrorism. The field also extends to the political economy of terrorism, which seeks to answer questions on the effect of terrorism on voter preferences and party politics.