Understanding Terrorism: Volume 22

Subject:

Table of contents

(18 chapters)
Purpose

The aim of this chapter is to investigate the meaning of terrorism, with a view to highlighting the main hurdles in the way of creating a working definition, as well as the necessity of developing definitions and classifications of this phenomenon.

Design methodology/approach

This chapter provides an overview of the literature on terrorism as a social/political phenomenon. It is therefore based on secondary sources.

Findings

While most literature on the topic finds it pointless or impossible to define terrorism, here we argue just the opposite. Common critiques of current definitions may be overcome by using multiple definitions and classifications.

Research limitations/implications

The chapter provides the methodological foundations for a comprehensive theoretical analysis of terrorism.

Originality/value of the chapter

The chapter applies insights from methodology of social sciences to the problem of defining terrorism.

Purpose

The purpose of this contribution is to review the theoretical and empirical literature on the economic determinants of terrorism.

Methodology/approach

Review of the relevant academic literature.

Findings

This contribution shows that there is a theoretical foundation to the popular hypothesis that poor economic conditions are conducive to terrorism. A review of the empirical evidence on the economic determinants of terrorism, however, yields an inconclusive result. Some studies find that economic conditions (directly and indirectly) matter to terrorism, whereas a plurality of studies suggest that noneconomic factors are more important.

Research limitations/implications

The findings of the survey indicate that it is unlikely that economic conditions are universal determinants of terrorism. By pointing at several avenues of future research (e.g., a focus on the role of ideology in terrorism), this contribution, however, argues that the opposite also does not need to be true. The influence of economic factors on terrorism should neither be overemphasized nor completely ruled out.

Originality/value of chapter

The contribution offers a comprehensive overview of the economy–terrorism nexus and hints at promising areas of future research.

Purpose

The purpose of this study is to assess the ability of a theoretically motivated statistical model to accurately forecast annual, national counts of terror attacks out-of-sample.

Methodology/approach

Bayesian multi-level models, classification analysis, marginal calibration plots

Findings

We find that the model forecasts reasonably well, but conclude that its overall performance suggests that it is not ready for use in policy planning. This is likely due to the coarse temporal and spatial aggregation of the data.

Research limitations/implications

The implications of this study are that social scientists should devote more effort into evaluating the predictive power of their statistical models, and that annual, national data on violent conflict are probably too coarse to provide useful information for policy planning.

Originality/value of paper

The primary value of our modeling effort is to provide a baseline against which to evaluate the performance of more region- and country-specific models to be developed in the future.

Purpose

The purpose of this study is to define the interactions that determine how secure a society is from terrorism and to propose a method for measuring the threat of terrorism in an objective and spatio-temporally comparable manner.

Methodology/approach

Game-theoretic analysis of the determinants of security and discussion of how to implement these interactions into a measure of security.

Findings

We show that governments concerned with popularity have an incentive to over-invest in security and that, in certain situations, this leads to a deterioration in net security position. Our discussion provides an implementable means for measuring the levels of threat and protection, as well as individuals’ perceptions of both, which we propose can be combined into an objective and scientific measure of security.

Research limitations/implications

The implication for researchers is the suggestion that efficiency, as well as scale of counter-terrorism, is important in determining a country’s overall security position. Furthermore, we suggest that individuals’ perceptions are at least as important in determining suitable counter-terrorism policy as objective measures of protection and threat. The limitations of this research are found in the vast data requirements that any attempt to measure security will need.

Originality/value of the chapter

We propose the first method for objectively measuring the net security position of a country, using economic and econometric means.

Purpose

This aim of this chapter is to outline the rationale and methodology behind the development of the Global Terrorism Index (GTI), a composite index which attempts to measure the unobserved latent impact of terrorism across 158 countries covering over 99% of the world’s population.

Design methodology/approach

The GTI attempts to capture the multidimensional direct impact of terrorist related violence, in terms of its physical effect, as well as emotional wounds and fear, by attributing a single-weighted average national level score. It is based on the Global Terrorism Database (GTD). This chapter also details selection of the indicators, weighting methodology and method of normalisation.

Findings

The GTI aims to be a reference point from which one can further discuss how researchers and the general public collectively define, interpret and contextualise the social, political and economic impact of terrorism.

Research limitations/implication

Certain issues related to the data remain intractable (e.g., missing injury data in the GTD and property damage). The chapter also suggests a number of areas in which the basic index design could be expanded upon.

Originality/value of the chapter

By presenting the GTI the chapter provides a relative measure of terrorism. Its value rests in the possibility to compare the impact of terrorism between countries and scores, analyse trends over the time and assess the aggregate global impact of terrorism.

Purpose

Terrorist events are unforeseen and have the potential to shake and rattle markets and investors. The purpose of this study is to examine whether major terrorist incidents have affected the Economic Sentiment Indicator (ESI) in four European countries.

Methodology/approach

An index is constructed that weights the severity of each event and then used to evaluate through the use of vector autoregressive and impulse response analysis estimation techniques whether or not and to what extent the ESI has been affected.

Findings

Effects were more pronounced and evident in the case of France and Germany while the ESI in Spain and Great Britain did not appear to be particularly affected by terrorist incidents.

Research limitations/implications

The effects of terrorism on economic sentiment in other countries will provide additional evidence that will allow more robust and conclusive statistical inferences.

Originality/value of the chapter

The impact of terrorist activity on the ESI for the four European countries studied here has not been examined before using VAR and impulse response analysis.

Purpose

The aim of the chapter is to outline a framework for a cultural analysis of terrorism. It is based on an analogy between the logic that characterizes terrorism and the logic that characterizes the “worlds” of artistic and cultural production.

Design methodology/approach

This chapter critically examines some explanations of the logic of terrorism which respectively assign a central role to individual psychology, the rational choice of the group and values. It is therefore based on secondary sources.

Findings

The chapter argues that the logic of terrorism can be fully understood only as a result of the “cultural” construction of collective and individual identities.

Research limitations/implication

The chapter provides a framework for a cultural analysis of terrorism.

Originality/value of the chapter

The chapter borrows the concept of a “political world” and makes of it a central tool to explain the set of symbolic products that characterizes terrorism.

Purpose

This chapter explains how economic analysis can contribute to the delineation of the lone wolf’s opportunities and choices in a manner that allows operationally relevant advice to be contributed to the investigative process.

Approach

Using a risk-reward analytical framework we examine the lone wolf’s attack method opportunities and choices and identify those attack methods that would be chosen by lone wolves with different levels of risk aversion. We also use prospect theory as an alternative methodology for the determination of the lone wolf’s preference orderings over the available attack methods in a context where he references his actions against those of a predecessor whom he wishes to emulate.

Findings

We find that lone wolf terrorists with different levels of risk aversion can be expected to choose different attack methods or combinations of attack methods. More risk averse lone wolf terrorists will choose attack methods such as assassination. Less risk averse lone wolf terrorists will choose attack methods such as bombing, hostage-taking and unconventional attacks. Also, we find that lone wolf terrorists who reference their actions against ‘predecessor’ lone wolf terrorists will choose differently from among the available attack methods depending on which predecessor lone wolf is being referenced.

Limitations

The analysis provides two different perspectives on terrorist choice but by no means exhausts the analytical alternatives. The analysis focuses on the fatalities and injuries inflicted whereas other perspectives might include different ‘payoffs’ series, including news or media coverage.

Originality

The chapter contributes an analysis of the order in which lone wolf terrorists with particular characteristics will choose from a set of available attack methods. During the course of our discussion we point out the consistency between the ‘rise’ of the lone wolf terrorist and the diseconomies to scale that are evident within the terrorism context. This presents the opportunity for new debates.

Purpose

An investigation of parallels between homegrown, international, and domestic terrorism.

Methodology/approach

A comparative method is used to analyze data from two main sources, ITERATE data on international and the TWEED data on domestic terrorism. The similarities are tested in various dimensions – target types, severity, and the method of the attacks.

Findings

Homegrown terrorism is inherently motivated by domestic issues. Moreover, variables of ethnic heterogeneity, political inclusiveness of fringe groups, and problems in the democratization process are good predictors of the occurrence of other forms of domestic and homegrown terrorism alike.

Research limitations/implications

Number of observable cases of homegrown terrorism are low. The two main datasets have potentially overlapping incidents.

Originality/value

Provides and operational definition of homegrown terrorism and test empirically the similarity between homegrown and other types of terrorisms.

Purpose

This chapter examines the phenomenon of cyberterrorism, which is a form of terrorism that could be potentially devastating as terrorists could, through computer networks, wreak havoc in the critical infrastructure of an advanced country.

Methodology/approach

Review of relevant literature.

Findings

The chapter argues that there are actually two types of cyberterrorism: “Hard-Rock” and “Lite.” Both are potential “force multiplier” for terrorists. The former relies on attacking a country’s infrastructures via computer networks and blocking the working of critical functions like water and energy distribution and the like. Because of its complexity and costs, this type of cyberterrorism is far from frequent and actually almost non-existent. The latter type (Lite) is much more commonplace and is the capability by terrorist organizations to use the Web (and the Internet) to communicate with their affiliates, recruit new elements and, most importantly, publicize their deeds.

Research limitations/implications

Because the use of the Web and the Internet by terrorists give intelligence agencies more opportunities to actually monitor them, this form of terrorism is much more a “double-edged sword” than regular terrorism.

Originality/value of the chapter

The chapter tries to better classify and compare the two forms of cyberterrorism; it also shows how remote the prospect of Hard-Rock Cyberterrorism still is.

Purpose

The purpose of this chapter is to investigate on the relationship between terrorism, criminal organisations, and the so-called ‘new wars’.

Methodology/approach

Review of the existing literature on the ‘new wars’ and on the terrorism–crime nexus; estimate of the financial revenues gained by terrorist groups engaged in illicit activities.

Findings

Terrorist and criminal groups can develop several forms of collaboration. Whether terrorists convert to criminal activities or not depends on a variety of factors, both internal and external. In some cases these links are occasional and opportunistic, associated with the possibility of exploiting the availability of specialised competences in a stateless environment, in other cases the warring parties are directly involved and create stable relationships as a way to finance their war activities.

Research limitations/implications

Lack of reliable data limits a comprehensive analysis. Nevertheless, the study has important consequences for designing and adopting more effective policies regarding terrorism, organised crime, as well as conflict resolution.

Originality/value of the chapter

The study presents an overview of different strands of the literature on terrorism; a discussion is articulated on the interplay between ‘new wars’ and the terror–crime connection. Potentially fruitful avenues of investigation are suggested for future research.

DOI
10.1108/S1572-8323(2014)22
Publication date
2014-06-21
Book series
Contributions to Conflict Management, Peace Economics and Development
Editors
Series copyright holder
Emerald Publishing Limited
ISBN
978-1-78350-827-3
eISBN
978-1-78350-828-0
Book series ISSN
1572-8323