恐怖主义事件数据库的演变

G. LaFree
{"title":"恐怖主义事件数据库的演变","authors":"G. LaFree","doi":"10.1093/OXFORDHB/9780198732914.013.3","DOIUrl":null,"url":null,"abstract":"Terrorism event databases provide systematized descriptive information about terrorist attacks from unclassified, open sources where the attack is the unit of analysis. There have been a dozen or more systematic efforts to build terrorism event databases over the past four decades. Because terrorism is a type of behavior that is difficult to study by more traditional means (e.g. police reports or victim or offender surveys), event databases have come to fill an important niche. Contemporary efforts to build event databases can be traced back to the late 1960s and are likely related to the introduction of satellites and portable video equipment—technology that made it possible to send instantaneously images of conflict and violence from any one place on the planet to any other place. Thus far the most comprehensive event databases have been the RAND Memorial Institute for the Prevention of Terrorism and the RAND Database of Worldwide Terrorism Incidents (MIPT-RDWTI), the International Terrorism: Attributes of Terrorist Events (ITERATE), the Global Terrorism Database (GTD), the terrorism data collected by the US State Department, and the World-Wide Incidents Tracking System (WITS). Given the often clandestine nature of terrorism, event data have important weaknesses, most notably media inaccuracies; conflicting information or false, multiple, or no claims of responsibility; government censorship and disinformation; and a lack of systematic empirical validation. Nevertheless, event databases on terrorism can be justified in part because most terrorists seek publicity. Likely future improvements include better coverage of domestic terrorism, more extensive automated coding, enhanced geo-spatial coding, and better linkages to related databases.","PeriodicalId":124314,"journal":{"name":"The Oxford Handbook of Terrorism","volume":"60 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"The Evolution of Terrorism Event Databases\",\"authors\":\"G. LaFree\",\"doi\":\"10.1093/OXFORDHB/9780198732914.013.3\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Terrorism event databases provide systematized descriptive information about terrorist attacks from unclassified, open sources where the attack is the unit of analysis. There have been a dozen or more systematic efforts to build terrorism event databases over the past four decades. Because terrorism is a type of behavior that is difficult to study by more traditional means (e.g. police reports or victim or offender surveys), event databases have come to fill an important niche. Contemporary efforts to build event databases can be traced back to the late 1960s and are likely related to the introduction of satellites and portable video equipment—technology that made it possible to send instantaneously images of conflict and violence from any one place on the planet to any other place. Thus far the most comprehensive event databases have been the RAND Memorial Institute for the Prevention of Terrorism and the RAND Database of Worldwide Terrorism Incidents (MIPT-RDWTI), the International Terrorism: Attributes of Terrorist Events (ITERATE), the Global Terrorism Database (GTD), the terrorism data collected by the US State Department, and the World-Wide Incidents Tracking System (WITS). Given the often clandestine nature of terrorism, event data have important weaknesses, most notably media inaccuracies; conflicting information or false, multiple, or no claims of responsibility; government censorship and disinformation; and a lack of systematic empirical validation. Nevertheless, event databases on terrorism can be justified in part because most terrorists seek publicity. Likely future improvements include better coverage of domestic terrorism, more extensive automated coding, enhanced geo-spatial coding, and better linkages to related databases.\",\"PeriodicalId\":124314,\"journal\":{\"name\":\"The Oxford Handbook of Terrorism\",\"volume\":\"60 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-03-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"The Oxford Handbook of Terrorism\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1093/OXFORDHB/9780198732914.013.3\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Oxford Handbook of Terrorism","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1093/OXFORDHB/9780198732914.013.3","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

恐怖主义事件数据库提供了有关恐怖主义袭击的系统化描述性信息,这些信息来自于以攻击为分析单元的非分类、开放资源。在过去的四十年里,已经有十几个或更多系统的努力来建立恐怖主义事件数据库。由于恐怖主义是一种难以通过传统手段(例如警察报告或受害者或罪犯调查)进行研究的行为,事件数据库已经开始填补一个重要的利基。当代建立事件数据库的努力可以追溯到20世纪60年代末,可能与卫星和便携式视频设备的引入有关——这些技术使从地球上任何一个地方向任何其他地方即时发送冲突和暴力图像成为可能。迄今为止,最全面的事件数据库是兰德预防恐怖主义纪念研究所和兰德全球恐怖主义事件数据库(MIPT-RDWTI)、国际恐怖主义:恐怖事件的属性(ITERATE)、全球恐怖主义数据库(GTD)、美国国务院收集的恐怖主义数据和全球事件跟踪系统(WITS)。鉴于恐怖主义通常具有秘密性质,事件数据存在重大缺陷,最明显的是媒体不准确;相互矛盾的信息或虚假的,多重的,或没有责任的主张;政府审查和虚假信息;缺乏系统的经验验证。然而,关于恐怖主义的事件数据库是合理的,部分原因是大多数恐怖分子寻求宣传。未来可能的改进包括更好地覆盖国内恐怖主义、更广泛的自动化编码、增强的地理空间编码以及与相关数据库的更好联系。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
The Evolution of Terrorism Event Databases
Terrorism event databases provide systematized descriptive information about terrorist attacks from unclassified, open sources where the attack is the unit of analysis. There have been a dozen or more systematic efforts to build terrorism event databases over the past four decades. Because terrorism is a type of behavior that is difficult to study by more traditional means (e.g. police reports or victim or offender surveys), event databases have come to fill an important niche. Contemporary efforts to build event databases can be traced back to the late 1960s and are likely related to the introduction of satellites and portable video equipment—technology that made it possible to send instantaneously images of conflict and violence from any one place on the planet to any other place. Thus far the most comprehensive event databases have been the RAND Memorial Institute for the Prevention of Terrorism and the RAND Database of Worldwide Terrorism Incidents (MIPT-RDWTI), the International Terrorism: Attributes of Terrorist Events (ITERATE), the Global Terrorism Database (GTD), the terrorism data collected by the US State Department, and the World-Wide Incidents Tracking System (WITS). Given the often clandestine nature of terrorism, event data have important weaknesses, most notably media inaccuracies; conflicting information or false, multiple, or no claims of responsibility; government censorship and disinformation; and a lack of systematic empirical validation. Nevertheless, event databases on terrorism can be justified in part because most terrorists seek publicity. Likely future improvements include better coverage of domestic terrorism, more extensive automated coding, enhanced geo-spatial coding, and better linkages to related databases.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信