Next Article in Journal
How Does China’s New Consumption Era Reshape Residents’ Shopping Behaviors from the Perspective of Community in Hohhot, China
Next Article in Special Issue
Improving Safety Management through Analysis of Near-Miss Reports—A Tanker Ship Case Study
Previous Article in Journal
University Students’ Perception, Evaluation, and Spaces of Distance Learning during the COVID-19 Pandemic in Austria: What Can We Learn for Post-Pandemic Educational Futures?
Previous Article in Special Issue
Agricultural Tractor Roll-Over Related Fatalities in Italy: Results from a 12 Years Analysis
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Quantitative Analysis of Global Terrorist Attacks Based on the Global Terrorism Database

1
School of Emergency Management and Safety Engineering, China University of Mining & Technology (Beijing), Beijing 100083, China
2
School of Civil, Mining and Environmental Engineering, University of Wollongong, Wollongong, NSW 2500, Australia
*
Author to whom correspondence should be addressed.
Sustainability 2021, 13(14), 7598; https://doi.org/10.3390/su13147598
Submission received: 2 June 2021 / Revised: 19 June 2021 / Accepted: 4 July 2021 / Published: 7 July 2021
(This article belongs to the Special Issue Risk Management and Safety Engineering)

Abstract

:
Terrorist attacks have become a serious source of risk affecting the security of the international community. Using the Global Terrorism Database (GTD), in order to quantitatively study past terrorist attacks and their temporal and spatial evolution the analytic hierarchy process (AHP) was used to classify the degree of damage from terrorist attacks. The various factors influencing terrorist attacks were extracted and represented in three dimensions. Subsequently, using MATLAB for analysis and processing, the grading standards for terrorist attacks were classified into five levels according to the degree of hazard. Based on this grading standard, the top ten terrorist attacks with the highest degree of hazard in the past two decades were listed. Because the characteristics and habits of a terrorist or group exhibit a certain consistency, the K-means cluster analysis method was used to classify terrorists according to region, type of attack, type of target and type of weapon used by the terrorists. Several attacks that might have been committed by the same terrorist organization or individual at different times and in different locations were classified into one category, and the top five categories were selected according to the degree of sabotage inflicted by the organization or individual. Finally, the spatiotemporal evolution of terrorist attacks in the past three years was analyzed, considering the terrorist attack targets and key areas of terrorist attacks. The Middle East, Southeast Asia, Central Asia, and Africa were predicted to be the regions that will be most seriously affected by future global terrorist events. The terrorist attacks in Southeast Asia are expected to become more severe, and the scope of terrorist attacks in Africa is expected to widen. Civilians are the targets most at risk for terrorist attacks, and the corresponding risk index is considerably higher than it is for other targets. The results of this research can help individuals and the government to enable a better understanding of terrorism, improve awareness to prevent terrorism and enhance emergency management and rescue, and provide a solid and reliable basis and reference for joint counterterrorism in various countries and regions.

1. Introduction

Terrorism is a complex political and social phenomenon [1,2]. Terrorist attacks are obviously destructive and violent. They have become one of the greatest threats to the peace and security of the international community and have become a hotspot of global concern. Terrorist attacks can be defined as involving illegal or criminal violence, threats or sabotage activities conducted by non-governmental organizations to achieve political, economic, religious or social goals through threats, coercion or intimidation [3,4]. Policymakers and pundits tend to cast terrorist attacks as either rational acts of crass material self-interest, or mental abnormality [5,6]. Terrorist attacks often target civilians [7], not only endangering people’s lives and property, but also affecting the order and stability of the entire society. Terrorist attacks, as unconventional emergencies, often cause a large number of casualties and have a huge social impact.
Terrorist activities intensified around the world after the Cold War. Various forms of terrorist attacks have become increasingly rampant and are a major public nuisance for the international community; presently, these attacks are the most severe security challenge facing the world [7,8,9,10]. In particular, several major vicious terrorist attacks have occurred in recent years, such as the Kunming Railway Station terrorist attack in China on 1 March 2014; Thailand’s four-faced Buddha bombings on 17 August 2015; the Paris, France terror attacks in November 2015; the terrorist attack in Nice, France on 14 July 2016; and the Sri Lanka bombings on 21 April 2019 [11,12,13], all of which caused critical overall damage. Therefore, evaluating the damage degree of terrorist attacks, determining the location of the perpetrators of terrorist attacks, and analyzing the future global situation regarding antiterrorism have become important topics pertaining to anti-terrorism research. Effective counterterrorism strategies and emergency rescue plans can be formulated only by conducting research on terrorist attacks, and analyzing the various factors influencing terrorist attacks. Several analytical studies on terrorist attacks have been conducted by different researchers. Risk assessment is essential for managers to control risks and make decisions [14]. The assessment of potential terrorist attack risks can improve the purpose of counter-terrorism, for example, reducing the possibility of a target being attacked and reducing the degree of destruction of the target [15,16]. Regarding the risk assessment of terrorist attacks, Guo Xuan et al. [17] proposed a risk assessment model for civil aviation airport terrorist attacks, based on event tree analysis (ETA) and probabilistic risk analysis (PRA), and used the model to simulate events considering aspects such as the terrorist attack mode, intrusion path and loss probability. From the four aspects of terrorism that have been determined based on the global terrorism database (GTD), specifically, the power law of frequency-fatalities, relationships between fatality levels and influential factors, spatial aggregation and spatial autocorrelation and risk assessment, Li Guohui [16] established a risk assessment model and risk distribution map. Based on the scenario risks associated with different terrorist attacks, Garrick et al. [15] developed a method for quantitatively assessing the risk of terrorism that focused on the catastrophic consequences of terrorist attacks. Ezell et al. [18,19] explored several existing and potential methods of risk analysis, and argued that PRA and ETA were effective methods for assessing the risk of terrorism, especially for the baseline comparison, in terms of risk generation. With the rapid development of terrorist organizations, especially international terrorist attacks, it has been difficult to counter it with the power of only one country. This problem requires improved research on the temporal and spatial distribution characteristics of terrorist attacks [20,21]. Regarding the temporal and spatial evolution of terrorist attacks, Siebeneck et al. [22,23] analyzed the spatial and temporal evolution of terrorist attacks in Iraq from 2004 to 2006, and used the geographic information system (GIS) to carry out a series of spatial and temporal cluster identification analyses regarding recent terrorist incidents in Iraq. Based on the GTD, Wei Zhenzhen [24] analyzed the consequences, sources and characteristics of post-9/11 terrorist attacks, and found the six major status quo and four major development trends of terrorism in the post-9/11 era. The status of international terrorism and terrorist attacks after the Iraq war was analyzed by Chen Jing [25], who noted that five major trends were present in the current development of international terrorism, and proposed counterterrorism measures against these five major trends. Clauset [26,27] proposed a frequency model for several terrorist attacks that predicts the severity of terrorist attacks in the form of an exponential function; the author next verified the effectiveness of the model through subsequent terrorism and terrorist attacks. Later, Clauset et al. [28] conducted static and dynamic analyses on global terrorist attacks from 1968 to 2008 and observed that the occurrence of violence tended to accelerate with the increase in scale and experience. Abrahms [29] studied 125 violent substate campaigns to assess the effectiveness of terrorism empirically. Drawing on political psychology, he explained why terrorist campaigns against military targets are significantly more effective than campaigns against civilian targets at inducing government concessions. Nearly 600 terrorist attacks in various regions of the United States from 1990 to 2011 were studied by Lafree [30,31], who found that terrorist attacks were more common in regions characterized by residential instability and high urbanization, and recommended that researchers and decision-makers should focus more on the underlying connections among measures of social disorganization, participation in terrorist attacks, and law enforcement. However, most of these studies were qualitative descriptions and lacked a theoretical basis. Only a few studies involved the performing of a quantitative analysis of terrorist attacks by considering the various influential factors.
Unlike natural disasters, such as earthquakes and typhoons, terrorist attacks have the characteristics of premeditation, suddenness and sociality, and they evolve spatially and temporally [32]. Not only is it necessary to strengthen intelligence collection regarding recent terrorist attacks, but historical terrorist attacks must also be analyzed thoroughly to quantitatively study their temporal and spatial evolution. In this study, based on the GTD, the analytic hierarchy process (AHP) was used to classify the damage degree of terrorist attacks, and the various factors influencing terrorist attacks were extracted and represented in three dimensions. The K-means cluster analysis method was employed to classify the terrorists according to their common weapons, locations, attack methods, etc., and the terrorist attacks were analyzed from a quantitative perspective. Finally, the temporal and spatial evolution of terrorist attacks were analyzed from two aspects, the targets of terrorist attacks and the key areas of terrorist attacks. The research results are helpful for improving the pertinence and effectiveness of anti-terrorism strategies.

2. Global Terrorism Database

Current internationally published terrorism databases mainly include the global terrorism database (GTD), the RAND database of worldwide terrorism incidents (RDWTI), the “International Terrorism: Attributes of Terrorist Events” dataset (ITERATE), the world incident tracking system (WITS), and the “Terrorism in Western Europe: Events Database” (TWEED). Among these, the GTD is the most comprehensive database of terrorist incidents; it is open-source and includes information regarding terrorist events worldwide from 1970 through 2017. Unlike many other event databases, the GTD includes systematic data pertaining to transnational and international terrorist incidents that have occurred during the specified time period, and now includes more than 180,000 incidents. For each GTD incident, information regarding the date and location of the incident, the weapons used and the nature of the target, the number of casualties, and—when identifiable—the group or individual responsible, is available [33]. The terrorist attack data analyzed in this study were obtained entirely from the GTD (http://www.start.umd.edu/gtd/, accessed on 30 April 2020).
In this study, data in the GTD regarding terrorism incidents were selected to analyze the characteristics of terrorist attacks. First, using the advanced search function of the GTD database, all the terrorist incidents since the beginning of the 21st century were retrieved according to the time, and an Excel file was exported. Second, according to the types of attacks, weapons, target/victim types, murder information, damage results and other variables, the terrorist events were categorized and relevant data were obtained. The AHP method was used to rank the damage degree of the retrieved terrorist attacks, and the ten terrorist attacks involving the highest degree of harm in the past two decades were listed. In addition, six terrorist attacks that occurred in 2015 and that have not been categorized were selected. The K-means cluster analysis method was used to classify terrorists according to the region, type of attack, type of target, and type of weapon they used. Finally, the terrorist attacks that occurred from 2015 to 2017 were retrieved, and the GTD world maps for the period 2015–2017 were downloaded. The terrorist attacks over the past three years were analyzed, considering the two aspects of terrorist attacks and the key areas affected.

3. Assessment of Terrorist Attacks

Terrorist attacks are associated with mass destruction and can incur considerable casualties and property losses. Such events can lead to tremendous psychological pressure on people, cause a certain degree of turmoil in society, and hinder normal work and life order, thereby considerably hindering economic development. By grading the degree of damage associated with terrorist attacks, the severity of the damage caused by terrorist attacks on their targets can be clearly observed.

3.1. Establishment of an Evaluation Index System

3.1.1. Principle of Indicator Selection

Establishing an evaluation index system of terrorist attacks is a complex process involving factors related to the economics, culture, antiterrorism techniques, management, and other aspects of the attacked region. The process is also related to the organization that initiates the terrorist incident. A large number of cases must be considered to establish a risk classification system that corresponds to most terrorist incidents. The screening of hazard level indicators for typical terrorist incidents should follow the principles of rationality, comprehensiveness, the consideration of dynamics, systematization, and standardization.

3.1.2. Index Selection and the Construction of an Indicator System

The establishment of evaluation indicators is based on the case summary of the GTD database above. The factors that affect the consequences of terrorist attacks are identified and combined with the research experience of scholars to classify and summarize the corresponding indicators.
The analysis was performed by considering a large number of terrorist attacks and related references. Correctly evaluating the hazard level of terrorist attacks requires full consideration of the time, place, attack method, casualties and impacts of terrorist attacks; the evaluation factors and indicators of event grading were extracted based on this concept.
The grading factors of terrorist attacks include subjective and objective factors. Subjective factors include the factors related to the terrorist organization and are determined by the internal structure of the terrorist organization. The objective factors primarily include the time, region, target, and degree of damage, and are determined by multiple conditions. The specific indicators for each element can be described as follows.
(1) Degree of damage ( U 1 ). This factor indicates the degree of damage caused by a terrorist incident to the attacked organizations or objects. This factor is the most significant and the easiest to consider. In this study, two indicators in the GTD database were used for quantitative calculations, specifically, casualties ( C 11 ) and property losses ( C 12 ). These aspects are required to be determined from the total number of deaths, total number of injuries, extent of property damage, total number of victims, total ransom, and the kidnapping/hostage results, among other factors. Depending on the degree of damage, the attacked areas adopt different levels of emergency rescue measures to minimize the number of casualties as much as possible. By considering the damage degree of past terrorist attacks in the region, the local early-warning security system can be improved, and the damage caused to the local residents by the next terrorist attack can be reduced.
(2) Time ( U 2 ). This factor primarily includes the duration ( C 21 ) of the terrorist attacks. In general, countries and regions in which terrorist incidents occur require time to deal with terrorist attacks and attempt to protect the damaged facilities, rescue the hostages, and quickly investigate the perpetrators of the terrorist attack. According to past quantitative analyses performed using the GTD database, a timely rescue helps reduce casualties and property damage [10,16,24]. Considering the Lanchester combat model, the extent of counterterrorism can be noted to be related to the duration of the terrorist attack. A longer duration corresponds to a slower rescue response, which in turn leads to panic spreading more easily in the society, a more difficult counterterrorism operation, and more harm [34].
(3) Region ( U 3 ). A terrorist attack can influence terror differently in different regions. The level of casualties caused by terrorist attacks is related to the economic development of the region. Developed countries and regions are associated with low levels of death tolls, and developing countries (especially in parts of Africa and the Middle East) are associated with considerably higher levels of death tolls. The level of security in different areas, access to evacuation, and the number of targets that can be attacked in the region vary. Therefore, to determine the hazard level of a typical incident of a terrorist attack, it is necessary to consider the influence of various factors in different regions. In general, if the security of the area in which the terrorist incident occurs is high, a higher level of harm is caused by the terrorist attack. The national early warning system for homeland security formulated and implemented by the United States after the “9/11” incident has dynamic and intuitive characteristics, and it can be used as a benchmark for evaluating the security level of major regions and countries worldwide [35]. The Homeland Security Advisory System classifies hazard levels into five levels represented with the colors, in increasing severity, of green, blue, yellow, orange, and red. The green area ( C 31 ) is the fifth level, indicating the lowest terrorist threat or nonhazardous state; this level is representative of a country or region with a particularly high degree of security, nearly perfect security measures, and an extremely low probability of occurrence of terrorist attacks. If a terrorist attack occurs in this country or region, the level of the attack will be extremely high. The blue area ( C 32 ) is the fourth level, indicating a general threat. It means that the country or region has a high degree of security, the security measures are satisfactory, and the probability of a terrorist attack is low. If a terrorist attack occurs in this country or region, the level of the attack will be high. The yellow area ( C 33 ) is the third level, which indicates that certain severe threats and dangers exist. If a terrorist attack occurs in this country or region, the level of the attack will be low. The relevant departments should strengthen the patrol, surveillance and defense of key targets, and develop emergency response plans to deal with unexpected events. The orange area ( C 34 ) is the second level, indicating that the possibility of an attack is high. If a terrorist attack occurs in this country or region, the level of the attack will be considered extremely low, and the government departments must coordinate with the military and judicial personnel to adopt priority measures. Afghanistan, South Africa, Pakistan, Palestine and Israel are among the second-grade orange levels, corresponding to a higher risk probability. The red area ( C 35 ) is the most dangerous level and represents an extremely critical threat. If a terrorist attack occurs in such a country or region, the level of attack can be considered particularly low.
(4) Target ( U 4 ). This factor corresponds to the target of terrorist attacks, primarily including the government military ( C 41 ), public foundations ( C 42 ), and other ( C 43 ) such categories. Terrorist attacks against different objects correspond to different levels of terrorist incidents. According to the two-segment power distribution defined by Li Guohui [16], tourist and public facilities are related to a high number of deaths. Attacks on the police and government are related to low death tolls. Government military objects are highly armed or are protected by armed forces and are difficult to attack. If a terrorist attacks a government-type military target of a country or region, the level of terrorist attacks will be high; the level pertaining to public foundations is the second highest, and other types of targets correspond to the lowest level of terrorist attacks. It can be seen that the target of terrorist incidents and the corresponding degree of damage are different for different cases. Therefore, the impact of different targets on the level of hazard typical for terrorist attacks needs to be considered.
(5) Terrorist organization ( U 5 ). This factor refers to the characteristics of the terrorists, including murder type ( C 51 ), attack mode ( C 52 ) and weapon type ( C 53 ). The murderers can be classified into criminal and noncriminal groups. Considering the analysis of terrorist attacks in China, the consequences of terrorist attacks by the Uighur separatists, East Turkistan Islamic Movement, Muslim separatists and Tibetan independence organizations can be considered more severe than others. Furthermore, different terrorist organizations have different tendencies regarding different types of armed attacks, and the consequences of the attacks are also different. Attack methods can be divided into the first type (assassination, armed attack, bombing/explosion), the second type (hijacking, facility/infrastructure attack), and third type of attacks (hands-free attack and others). The results of different attacks are remarkably different, and the number of casualties caused by armed attacks and hijackings is the highest. Although the attack type of assassinations has the largest occurrence frequency, they do not lead to a large number of deaths because assassinations often have clear target figures and do not cause a large number of bystander casualties. Types of weapons include the first category of weapons (biochemical, nuclear, missile and, radiation weapons), the second category of weapons (light weapons, explosives/bombs/explosives, burning weapons), and the third category of weapons (fake weapons, vehicles, etc.). According to a case study carried out with the GTD database, the consequences of using different weapons are remarkably different. At present, the use of bombs and guns is the most frequent; however, the number of casualties and harmful consequences associated with terrorist attacks using vehicles and other chemical weapons are more critical. Therefore, a comprehensive evaluation of the three indicators of terrorist organizations is of considerable significance for the assessment of the level of hazard of typical terrorist incidents.
The evolution index system for terrorist attacks is shown in Figure 1.

3.2. Determination of Indicator Weights

The analytical hierarchy process (AHP) is a systematic and hierarchical analysis method combining qualitative and quantitative methods. It was proposed by the operational researcher T.L. Saaty in the 1970s [36]. The AHP decomposes the problem into different components according to the nature of the problem and the overall goal to be achieved, and combines the factors at different levels according to the interrelationship between the factors and the affiliation relationship, forming a multi-level analysis structure model. Therefore, the problem is ultimately attributed to the determination of the relatively important weight of the lowest level (plans, measures, etc.) to the highest level (the overall goal) or the arrangement of the relative priority and inferior order [37]. Based on the analytic hierarchy process, this paper presents the considered indicators in numerical form by introducing appropriate judgment scales to form a judgment matrix, which quantifies those qualitative problems that are difficult to quantify and provides a basis for evaluation and decision-making. The general process can be described as follows.

3.2.1. Hierarchical Model

The objectives of the decision, considered factors (decision criteria) and decision objects are divided into the highest layer, middle layer and lowest layer, according to the relationship among them, and the hierarchical structure diagram is obtained (Figure 1). The highest level corresponds to the purpose of decision-making and the problem to be solved. The lowest level corresponds to the alternatives when making decisions. The middle layer corresponds to the factors considered and the criteria for decision-making. For two adjacent layers, the upper layer is referred to as the target layer and the lower layer is the factor layer.

3.2.2. Structural Judgment Matrix

According to the uniform matrix method proposed by Saaty [36], by comparing two factors at a time, the relative scale is used to reduce the difficulty of comparing factors with different properties to improve the accuracy. For example, the schemes under a certain criterion are compared in pairs, and the grades are rated according to their importance. a i j denotes the comparison of the importance of the i and j elements, and Table 1 lists the nine importance levels and their assignments, as defined by Saaty. The five evaluation factors of U 1 , U 2 , U 3 , U 4 and U 5 are compared. Let a i j = U i / U j (If a 14 = U 1 / U 4 = 9 , then, U 1 is extremely important compared to U 4 ). The matrix formed by the comparison result is called the judgment matrix, A = ( a 11 a 1 n a n 1 a n n ) .
(i)
Normalization of each column of the matrix is performed using a i j * = a i j / s j , s j = i = 1 n a i j ( j = 1, 2, 3…n);
(ii)
For a matrix normalized by column, a sum by row is performed: W i = j = 1 n a i j / n , S * = ( W 1 , W 2 , , W n ) ( i = 1, 2, 3…n);
(iii)
The eigenvalue of the matrix is calculated as λ i = 1 / n i = 1 n ( A W ) i S i * .

3.2.3. Consistency Test of Judgment Matrix

(i)
Consistency indicator C I = ( λ max n ) ( n 1 ) ;
(ii)
Random consistency indicator R I , as shown in Table 2;
(iii)
Consistency ratio C R = C I / R I . Normally, if C R < 0.1, the judgment matrix is considered to pass the consistency test; otherwise, it does not have satisfactory consistency.
Based on previous research and expert scoring, the following judgment matrix can be obtained [38,39,40]:
A = { 1 7 3 6 9 1 / 7 1 1 / 2 4 / 5 2 1 / 3 2 1 2 3 1 / 3 5 / 4 1 / 2 1 2 1 / 9 1 / 6 1 / 3 1 / 2 1 }
After the matrix is normalized, the results obtained and the weight of each index are shown in Table 3.
Here, λ max = 5.18 , and C R = 0.03913 < 0.1 ; these values indicate that the weights obtained at this level are reasonable, the consistency is satisfactory, and no logic error is present. In addition, the same result can be obtained by transposing matrix A, which proves the rationality of the result.
The weights of the secondary indicators in each evaluation factor U 1 , U 2 , U 3 , U 4 , U 5 are respectively A 1 = [ 0.782 , 0.218 ] , A 2 = [ 1 ] , A 3 = [ 0 . 352 , 0 . 282 , 0 . 199 , 0 . 12 , 0 . 047 ] , A 4 = [ 0 . 412 , 0 . 315 , 0 . 273 ] , A 5 = [ 0 . 508 , 0 . 321 , 0 . 171 ] .
The combined weight of each three-level indicator was calculated recursively, the weight of the third-level indicator was multiplied by that of the secondary indicator, and the following result was obtained.
C 11 = 0.782 × 0.5212 = 0.4076 , C 12 = 0.218 × 0.5212 = 0.1136 , C 21 = 0.0922 × 1 = 0.0922 , C 31 = 0.352 × 0.1111 = 0.0391 , C 32 = 0.282 × 0.1111 = 0.0.03133 , C 33 = 0.199 × 0.1111 = 0.0221 , C 34 = 0.12 × 0.1111 = 0.0133 , C 35 = 0.047 × 0.1111 = 0.0052 , C 41 = 0.412 × 0.1105 = 0.0455 , C 42 = 0.315 × 0.1105 = 0.0348 , C 43 = 0.273 × 0.1105 = 0.0301 , C 51 = 0.508 × 0.055 = 0.0279 , C 52 = 0.321 × 0.055 = 0.0177 , C 53 = 0.171 × 0.055 = 0.0094 .
The weights of the 14 evaluation indicators for the level of danger of terrorist attacks are as defined above. It can be seen that the casualty factor C 11 has the most considerable impact on the level of terrorist attacks, followed by the property loss factor C 12 .

3.3. Terrorist Attack Classification

The level of terrorist attacks is determined by the expert scoring method. First, several indicators are selected according to the basic requirements of the evaluation object, and subsequently, the evaluation criteria are determined according to the evaluation indicators. According to the evaluation criteria, experts score the evaluation indicators in two stages: expert scoring process, expert blind review and screening process of invalid questionnaires. Finally, these scores are assembled.

3.3.1. Main Steps

Each indicator score value is assigned by each expert and obtained by using the following steps.
In the first step, based on the experience of experts and the statistical analysis of historical data [41,42], the ten-factor method is used to determine the index score range of 1–10 points. The most harmful (highest level) event corresponds to 10 points for each indicator, and the least harmful (lowest level) event is assigned 1 point for each indicator. The level scores for the highest and lowest level events are calculated:
V min = 1 ,   V max = 10 ,   Δ x = ( 10 1 ) / 4 = 2.25
Therefore, the hazard level of the terrorist attack is divided into five levels, namely, low hazard, lower hazard, higher hazard, high hazard and serious hazard levels. The level score standard is defined as follows: When 1 V < 2 , the hazard level is Class V, which is a lower hazard level. When 2 V < 4 , the hazard level is Class IV, which is a low hazard level. When 4 V < 6 , the hazard level is Class III, which is a high hazard level. When 6 V < 8 , the hazard level is Class II, which is a higher hazard level. When 8 V 10 , the hazard level is Class I, which is a serious hazard level.
In the second step, each expert determines the score of each index according to his/her experience, knowledge and understanding of the terrorist attacks, and an average value is obtained. This step is an important part of the expert rating and grading work. Three specific requirements for expert scoring have been proposed. The first is that sufficient information must be collected, and the severity of the indicators must be introduced in detail at the meeting of the expert judges. The second is that the meaning of each factor and the criteria for judging the indicators must be explained in detail. Third, the experts must have a comprehensive understanding and overall consideration before grading; furthermore, to judge, compare and analyze the severity of each indicator from the complete evaluation area, firstly, a qualitative analysis should be performed. Next, the situation of each index must be compared with the others in pairs, and the score of each index must be evaluated quantitatively.
The third step involves multiplying the score by the weight to obtain an event level score V. Next, the event is attributed to the corresponding level according to the standard of the level score. The indicator scores are presented in Table 4.

3.3.2. Determination of Evaluation Criteria

Considering the actual situation of terrorist attacks, the criteria for the indicators refer to the existing national, local and industrial standards or norms, and simultaneously draw on relevant statistical data, the results of qualitative analysis by experts, to quantify effective solutions to the boundary problem evaluation process and related literature research results, and then determine a reasonable evaluation standard.
According to the abovementioned model, the degree of harm of terrorist attacks since the beginning of the 21st century was calculated, and the top ten terrorist attacks with the highest degree of harm were selected according to the scores. The hazard level was Class I, and the severity level was critical. The details are presented in Table 5.

4. Mining Data Features to Identify Criminal Masterminds

In the terrorist attacks that occurred, a number of incidents have not yet been identified, which is not conducive to the development of targeted counterterrorism strategies. Several cases may have been committed by the same terrorist organization or individuals at different times and in different locations. If these cases are concatenated for unified investigation, the efficiency of the case can be improved, and early detection of new or hidden terrorists can be facilitated. Therefore, in this study, six terrorist attacks that occurred in 2015 that have not yet been categorized or taken responsibility for were selected. Based on the hierarchical clustering technique [43,44], the terrorist organizations (or individuals) that committed multiple crimes at different times and in different locations were classified and identified. The corresponding unknown crime organizations or individuals were marked with different codes; the top five among these were selected according to the harm caused by the organization or individual and recorded as Nos. 1–5. Subsequently, for the terrorist attacks listed in Table 6, the five suspects were sorted according to the degree of suspicion.

4.1. Problem Analysis

A terrorist or group exhibits a certain consistency in their crime characteristics and tendencies. In this study, we selected four data types for analysis, and some data that were not important or relevant for this analysis were discarded. The analysis process is illustrated in Figure 2.
(1) The region is a common factor. For a specific organization or individual, due to the limited scope of activities, the crime sites tend to be concentrated in a specific area. (2) The target factor is a crucial factor affecting the terrorist attack. (3) According to historical data and previous analyses, the attack methods of a particular terrorist exhibit similarities. (4) The types of weapons employed also tend to be similar.

4.2. Principle of Clustering Algorithm

The basic idea of the clustering algorithm analysis is to observe the close relationships among the samples, according to the numerical characteristics of the objects [45,46,47]. Once the distance between the samples has been defined, the samples with smaller distances are grouped together. The K-Means algorithm is an unsupervised clustering algorithm; it is simple to implement, and the clustering effect is satisfactory. Therefore, this algorithm was employed for performing the calculations.
For a given sample set, the sample set is divided into k clusters according to the distance between the samples. Let the points in the cluster be connected as closely as possible, and let the distance between the clusters be as large as possible. If we use a data expression assuming that the cluster is divided into ( C 1 , C 2 , C k ) , the goal is to minimize the squared error E :
E = i = 1 k x i c i x μ i 2 2
where μ i is the mean vector of cluster C i , which is sometimes known as the centroid, and it can be expressed as follows:
μ i = 1 | C i | x C i x
The flow of the K-means algorithm can be described as follows:
The input is the sample set D = { x 1 , x 2 , x m } , the cluster tree of the cluster is k , and the maximum number of iterations is N . The output is clustered as C = { C 1 , C 2 , C k } .
(1)
Randomly select k samples from the data set D as the initial centroid vector: { μ 1 , μ 2 , , μ k } ;
(2)
For n = 1 , 2 , , N ;
(i)
To make C i = ( 1 i k ) ;
(ii)
Calculate the distance between the samples to the k mean vector for all sample points; take the mark of the mean vector corresponding to the shortest distance as the cluster mark of the point, and add the point to the corresponding cluster C i ;
(iii)
Calculate the new mean vector μ i = 1 | C i | x C i x for each cluster. If there is a change from the previous vector, update it and use it as the new mean vector. If there is no change, the mean vector remains the same;
(3)
Output cluster division C = { C 1 , C 2 , C k } .

4.3. Identification of Criminal Masterminds

In this study, six terrorist attacks that occurred in 2015 and that have not been claimed responsibility for by organizations or individuals were selected, as described in the following table.
Due to the major differences between the various attributes, to eliminate the influence of the order of magnitude, the dispersion needs to be standardized before clustering. The standardized sample data are presented in Table 7.
After the data are processed, the modeling data is generated. The K-means clustering algorithm is used to cluster the modeling data, based on the spatiotemporal feature cases of the terrorist attacks, and the pedigree clustering graph is obtained, as shown in Figure 3.
For the clustering results, a line graph of the five features according to different types is plotted, as shown in Figure 4. There may be several cases in which the same terrorist organization or individual has committed multiple crimes at different times and in different locations. The corresponding unknown crime organizations or individuals were marked with different codes, and the first five of them were selected according to the degree of damage inflicted by the organization or individual; these entities were recorded as Nos. 1–5. Table 8 lists the terrorist attacks and the five suspects, sorted according to the degree of suspicion.
For suspect 1, the terrorist attack has geographical characteristics with a value of less than 0.5, the corresponding actual area is an area with a value of less than 5, such as North America, South America, East Asia, the Middle East and North Africa; the other attack types have values less than 0.3. The corresponding types of attacks are mostly assassinations, armed attacks and bombings/explosions. In the target types with values less than 0.4, the corresponding target range is still relatively wide, the characteristics are not notable, the weapon type has values in the range 0.3–0.7, and the corresponding weapon types are nuclear weapons, light weapons, explosives, and burning weapons.
For suspect 2, the attack area is relatively broad and does not have any obvious features. The attack type has a value less than 0.5. The corresponding attack types are mostly assassinations, armed attacks, bombings or explosions, hijackings, and discrimination, and the target type has a value less than 0.5; the corresponding target range is still relatively wide, and the features are not sufficiently obvious. The weapon type range is 0–1, and no characteristic mark is present.
For suspect 3, the most notable feature is the type of weapon, including mainly fake weapons, vehicles, and equipment.
For suspect 4, the main feature is the type of attack, primarily concentrated in the value range of 0.4–0.9.
For suspect 5, in contrast to suspect 4, the attack type is mainly concentrated in the value range of 0–0.4, and the other characteristics are not highly differentiated.

5. Analysis of Spatiotemporal Evolution of Terrorism

5.1. Distribution Map of Key Regions of Terrorist Attacks

According to the analytical hierarchy process, it can be concluded that the intensity of terrorist attacks is mainly divided by the degree of casualties and property losses. It is shown that the main areas of terrorist attacks in the past three years can be roughly divided into four regions, especially the Middle East, Southeast Asia, Central Asia and Central Africa. Figure 5 [33] show the concentration and intensity of terrorist incidents in the past three years. The intensity of terrorist attacks has increased every year in Southeast Asia, which should be the focus of international counterterrorism. For the war-torn regions in the Middle East and Africa, which are the hotspots of global terrorist activity and cannot effectively resist terrorist attacks, antiterrorism efforts should be strengthened, and international support should be requested [48]. According to the spatiotemporal characteristics, spreading characteristics and grade distribution of terrorist attacks, it can be concluded that the key regions for future global terrorist attacks are the Middle East, Southeast Asia, Central Asia and Africa; terrorist attacks in Southeast Asia are expected to become more critical, and the scope of terrorist attacks in Africa is expected to widen.

5.2. Analysis of Terrorist Targets

There were 39,454 terrorist attacks that took place from 2015–2017; thus, the state of terrorist attacks is critical. The top five targets of terrorist attacks are citizens, the military, the police, governments, and businesses, as shown in Figure 6. In these three years, 11,502 terrorist attacks targeting citizens occurred, accounting for 29.2% of the total number of terrorist attacks. The second-largest target was the military, with 7920 attacks, accounting for 20.1% of all terrorist attacks. Civilians were the targets most at risk, and their risk index was considerably higher than that of other targets for the following reasons. First, after the 9/11 terrorist attack, the security at “hard targets” such as airports and stations was increased, rendering carrying out terrorist attacks difficult; therefore, terrorist attacks have turned to “soft targets” such as low-defense civilians. Second, the effective strength of terrorist organizations was weakened by the large-scale war on terror launched by the United States, and the structure of terrorist organizations has tended to become decentralized; thus, large-scale terrorist attacks, such as the 9/11 attack, have become difficult to organize, and the tendency is now to carry out “lone-wolf”-type civilian attacks. Third, a high level of civilian deaths is likely because defense facilities are not organized, the self-protection ability of civilians is weak, and a terrorist attack is sudden and critical. While military targets are inherently more resistant, terrorists tend to attack them to combat government prestige, create a terrorist atmosphere or achieve political goals [16]. Therefore, large-scale and planned terrorist attacks on military targets may result in a high death toll of military targets. The corresponding counterterrorism strategy could be formulated considering the risk index distribution of various targets. At present, the protection of civilian targets should be strengthened through specific measures such as accelerating the construction of intelligence systems, increasing the number of security personnel for important activities in important locations during high-risk periods, and improving the efficiency of emergency management after terrorist attacks.

6. Conclusions

Terrorist attacks have gradually become a critical issue of social concern. Based on the GTD, the AHP and the K-means cluster analysis method were used to evaluate the terrorist attacks from both qualitative and quantitative aspects. The terrorist attack targets and key regions of terrorist attacks in the past three years were emphatically analyzed. The research results help people get a clearer understanding of terrorism, improve the government’s vigilance and emergency management capabilities in the face of terrorist attacks, and provide a solid and reliable basis and reference for the joint counterterrorism of various countries and regions. The main conclusions are as follows:
(1) The AHP was used to classify the damage degree of terrorist attacks; certain variables with overlapping information and intricate relationships were attributed to a few unrelated comprehensive factors, and the grading standards of terrorist attacks were defined, in which the indicator of casualty degree had the greatest impact on the grade of terrorist attacks, followed by the property loss indicators. The top ten terrorist attacks with the highest degree of harm in the past two decades were listed.
(2) The K-means cluster analysis method was used to classify terrorists according to the region, type of attack, type of target and type of weapons used by the terrorists. The top five suspects in the 2015 terrorist attacks whose perpetrators had not yet been determined were identified.
(3) Terrorist attacks are showing a gathering trend that the vast majority of terrorist attacks and deaths have been concentrated in a few regions. The Middle East, Southeast Asia, Central Asia, and Africa were predicted to be the most severe areas of future global terrorist events according to the distribution map of key areas of terrorist attacks. The terrorist attacks in Southeast Asia will likely become more severe, and the scope of terrorist attacks in Africa is expected to widen. It shows a tendency to become a new hotspot area for terrorist attacks.
(4) According to the analysis of the targets of terrorist attacks in the past three years, civilians are the target most at risk from terrorist attacks, and their risk index is considerably higher than that for other targets. Decision-makers should focus on this and improve the response mechanism to terrorist attacks.

Author Contributions

Conceptualization, Z.L.; methodology, Z.L.; software, C.D.; validation, F.Z. and Q.Z.; formal analysis, Z.L. and F.G.; investigation, C.D.; data curation, F.G.; writing—original draft preparation, Z.L.; writing—review and editing, X.L.; visualization, F.Z.; supervision, X.L.; funding acquisition, X.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research is supported by the Key Special Projects of the National Key R&D Program of China (2018YFC0808301), Humanity and Social Science Youth Foundation of the Ministry of Education of China (19YJCZH087) and Fundamental Research Funds for the Central Universities (2009QZ09).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ackerman, G. WMD Terrorism Research: Whereto from Here? Int. Stud. Rev. 2010, 7, 140–143. [Google Scholar] [CrossRef]
  2. Hu, L.H. Terrorism and Countermeasures in Modem World; The Eastern Publishing Press: Beijing, China, 2001. [Google Scholar]
  3. Li, G.H.; Lu, S.; Cheng, X.D.; Yang, H.; Zhang, H.P. Study on Correlation Factors that Influence Terrorist Attack Fatalities Using Global Terrorism Database. Procedia Eng. 2014, 84, 698–707. [Google Scholar] [CrossRef] [Green Version]
  4. Krieger, T.; Meierrieks, D. What causes terrorism? Public Choice 2011, 147, 3–27. [Google Scholar] [CrossRef]
  5. Atran, S. Psychology of Transnational Terrorism and Extreme Political Conflict. Annu. Rev. Psychol. 2021, 72, 471–501. [Google Scholar] [CrossRef]
  6. Carriere, K.; Garney, G.; Moghaddam, F.M. Terrorism as a Form of Violence, 2nd ed.; The Cambridge Handbook of Violent Behavior and Aggression; Cambridge University Press: Cambridge, UK, 2018; pp. 626–644. [Google Scholar]
  7. Kaye, D.D. More Freedom, Less Terror?: Liberalization and Political Violence in the Arab World; RAND Corporation: Santa Monica, CA, USA, 2008. [Google Scholar]
  8. Chen, L.; Li, W. New developments in the international terror and anti-terrorist struggle. China Inf. Secur. 2017, 5, 60–63. [Google Scholar]
  9. Xun, Z.; Min, J.; Fu, J.; Hao, M.; Yu, C.; Xie, X. On the Risk Assessment of Terrorist Attacks Coupled with Multi-Source Factors. ISPRS Int. J. Geo-Inf. 2018, 7, 354. [Google Scholar]
  10. Hu, X.L.; Lai, F.J.; Chen, G.F.; Zou, R.C.; Feng, Q.X. Quantitative Research on Global Terrorist Attacks and Terrorist Attack Classification. Sustainability 2019, 11, 1487. [Google Scholar] [CrossRef] [Green Version]
  11. Yue, L.; Wu, Y. Research on the Impact of Crisis Events on Urban Development—A Case Study of Kunming Railway Station Terrorist Attack. J. Springer Singap. 2017. [Google Scholar] [CrossRef]
  12. Vasilopoulos, P. Terrorist events, emotional reactions, and political participation: The 2015 Paris attacks. J. West Eur. Politics 2017, 41, 102–127. [Google Scholar] [CrossRef]
  13. Quatrehomme, G.; Toupenay, S.; Delabarde, T.; Padovani, B.; Alunni, V. Forensic answers to the 14th of July 2016 terrorist attack in Nice. Int. J. Legal Med. 2019, 133, 1–11. [Google Scholar] [CrossRef] [PubMed]
  14. Tversky, K.A. Prospect Theory: An Analysis of Decision under Risk. Econometrica 1979, 47, 263–291. [Google Scholar]
  15. Garrick, B.J.; Hall, J.E.; Kilger, M.; McDonald, J.C.; Zebroski, E.L. Confronting the risks of terrorism: Making the right decisions. Reliab. Eng. Syst. Saf. 2004, 86, 129–176. [Google Scholar] [CrossRef]
  16. Li, G.H. Spatial and Temporal Evolution and Risk Analysis of Global Terrorist Attack; University of Science and Technology of China: Hefei, China, 2014. [Google Scholar]
  17. Xuan, G.; Wu, W.; Xiao, Z. Civil aviation airport terrorism risk assessment model based on event tree and PRA. Appl. Res. Comput. 2017, 34, 1809–1811. [Google Scholar]
  18. Ezell, B.; Bennett, S.P.; Winterfeldt, D.V.; Sokolowski, J.; Collins, A.J. Probabilistic risk analysis and terrorism risk. Risk Anal. An Int. J. 2010, 30, 575–589. [Google Scholar] [CrossRef]
  19. Ezell, B.C.; Winterfeldt, D.V. Probabilistic Risk Analysis and Bioterrorism Risk. Biosecur. Bioterror. Biodef. Strategy Pract. Sci. 2009, 7, 108–110; discussion 102–111. [Google Scholar] [CrossRef] [PubMed]
  20. Enders, W.; Gaibulloev, S.K. Domestic versus transnational terrorism: Data, decomposition, and dynamics. J. Peace Res. 2011, 48, 319–337. [Google Scholar] [CrossRef]
  21. Sandler, E.T. Is Transnational Terrorism Becoming More Threatening? A Time-Series Investigation. J. Confl. Resolut. 2000, 44, 307–332. [Google Scholar]
  22. Siebeneck, L.K.; Medina, R.M.; Yamada, I.; Hepner, G.F. Spatial and Temporal Analyses of Terrorist Incidents in Iraq, 2004–2006. Stud. Confl. Terror. 2009, 32, 591–610. [Google Scholar] [CrossRef]
  23. Medina, R.M.; Siebeneck, L.K.; Hepner, G.F. A Geographic Information Systems (GIS) Analysis of Spatiotemporal Patterns of Terrorist Incidents in Iraq 2004–2009. Stud. Confl. Terror. 2011, 34, 862–882. [Google Scholar] [CrossRef]
  24. Wei, Z. Data Analysison Post-911-Terrorism Based on GTD. J. Intell. 2017, 7, 17–19. [Google Scholar]
  25. Chen, J. New Tendency to International Terrorism and Countermeasures. J. Northeast. Univ. (Soc. Sci.) 2005, 7, 122–125. [Google Scholar]
  26. Clauset, A.; Young, M. Scale Invariance in Global Terrorism. Eprint Arxiv Phys. 2005, arXiv:physics/0502014. [Google Scholar]
  27. Clauset, A.; Young, M.; Kristian, S.G. On the Frequency of Severe Terrorist Events. J. Confl. Resolut. 2007, arXiv:physics/0606007. [Google Scholar] [CrossRef]
  28. Clauset, A.; Gleditsch, K.S. The Developmental Dynamics of Terrorist Organizations. PLoS ONE 2012, 7, e48633. [Google Scholar]
  29. Abrahms, M. The Political Effectiveness of Terrorism Revisited. Comp. Polit. Stud. 2012, 45, 366–393. [Google Scholar] [CrossRef]
  30. Lafree, G.; Bersani, B.E. County—Level Correlates of Terrorist Attacks in the United States. Criminol. Public Policy 2014, 13, 455–481. [Google Scholar] [CrossRef]
  31. Lafree, G.; Adamczyk, A. The Impact of the Boston Marathon Bombings on Public Willingness to Cooperate with Police. Justice Q. 2016, 34, 459–460. [Google Scholar] [CrossRef]
  32. Schneider, F.; Meierrieks, D. Terrorism; Terrorism: New York, NY, USA, 2014. [Google Scholar]
  33. National Consortium for the Study of Terrorism and Responses to Terrorism (START), University of Maryland. (2019). The Global Terrorism Database (GTD) [Data File]. Available online: https://www.start.umd.edu/gtd/ (accessed on 30 June 2021).
  34. Hao, L.I. Research on Models of Forecasting Anti-terrorist Combat Based on Lanchester Equation. Ship Electron. Eng. 2012, 32, 31–32. [Google Scholar]
  35. Hu, W.H.; Yan, J. Thoughts on Establishing a Security Mechanism for Overseas Chinese Security Risks. Commer. Times 2009, 1, 61–62. [Google Scholar]
  36. Saaty, T.L. How to Make a Decision: The Analytic Hierarchy Process. Eur. J. Oper. Res. 1994, 48, 9–26. [Google Scholar] [CrossRef]
  37. Xu, S.B. Practical Decision Method: Analytic Hierarchy Process Principle; Tianjin University Press: Tianjin, China, 1988. [Google Scholar]
  38. Luu, C.; Meding, J.V.; Kanjanabootra, S. Assessing flood hazard using flood marks and analytic hierarchy process approach: A case study for the 2013 flood event in Quang Nam, Vietnam. Nat. Hazards 2017, 90, 1–20. [Google Scholar] [CrossRef]
  39. Liu, X.K.; Zhu, H.Q.; Zhang, S.Z.; Zhang, R.M. Study on multi-level safety evaluation method based on compromise weight. J. Saf. Sci. Technol. 2010, 5, 92–96. [Google Scholar]
  40. Chen, Z.; Chen, T.; Qu, Z.; Yang, Z.; Ji, X.; Zhou, Y.; Zhang, H.; Yong, D. Use of evidential reasoning and AHP to assess regional industrial safety. PLoS ONE 2018, 13, e0197125. [Google Scholar] [CrossRef] [Green Version]
  41. Tong, R.; Yang, Y.; Ma, X.; Zhang, Y.; Yang, H. Risk Assessment of Miners’ Unsafe Behaviors: A Case Study of Gas Explosion Accidents in Coal Mine, China. Int. J. Environ. Res. Public Health 2019, 16, 1765. [Google Scholar] [CrossRef] [Green Version]
  42. Fu, G. Safety Management; Science Press: Beijing, China, 2013. [Google Scholar]
  43. Atsa’Am, D.D.; Wario, R.; Okpo, F.E. A New Terrorism Categorization Based on Casualties and Consequences Using Hierarchical Clustering. J. Appl. Secur. Res. 2020, 15, 369–384. [Google Scholar] [CrossRef]
  44. Brockhoff, S.; Krieger, T.; Meierrieks, D. Great Expectations and Hard Times: The (Nontrivial) Impact of Education on Domestic Terrorism. J. Confl. Resolut. 2015, 59, 1186–1215. [Google Scholar] [CrossRef]
  45. Sun, J.; Liu, J.; Zhao, L. Clustering Algorithms Research. J. Softw. 2008, 19, 48–61. [Google Scholar] [CrossRef]
  46. Sambasivam, S.; Theodosopoulos, N. Advanced Data Clustering Methods of Mining Web Documents. Issues Inf. Sci. Inf. Technol. 2006, 3, 563–579. [Google Scholar]
  47. Kumar, P.; Krishna, P.R.; Bapi, R.S.; De, S.K. Rough clustering of sequential data. Data Knowl. Eng. 2007, 63, 183–199. [Google Scholar] [CrossRef]
  48. Ojakorotu, V.; Ani, K.J.; Kamidza, R.; Ani, K.J. Response of the international community to terrorist attacks in Africa and Europe—A focus on Nigeria and France. Afr. Insight 2014, 44, 15–28. [Google Scholar]
Figure 1. Structure diagram of the evaluation index for the hazard level of terrorist attacks.
Figure 1. Structure diagram of the evaluation index for the hazard level of terrorist attacks.
Sustainability 13 07598 g001
Figure 2. Analysis flow chart.
Figure 2. Analysis flow chart.
Sustainability 13 07598 g002
Figure 3. Pedigree clustering diagram.
Figure 3. Pedigree clustering diagram.
Sustainability 13 07598 g003
Figure 4. Line charts for suspect numbers 1–5.
Figure 4. Line charts for suspect numbers 1–5.
Sustainability 13 07598 g004
Figure 5. (a) Concentration and intensity degree map of terrorist events in 2017 [33]. (b) Concentration and intensity degree map of terrorist events in 2016 [33]. (c) Concentration and intensity degree map of terrorist events in 2015 [33].
Figure 5. (a) Concentration and intensity degree map of terrorist events in 2017 [33]. (b) Concentration and intensity degree map of terrorist events in 2016 [33]. (c) Concentration and intensity degree map of terrorist events in 2015 [33].
Sustainability 13 07598 g005aSustainability 13 07598 g005b
Figure 6. Statistics for terrorist targets in 2015–2017.
Figure 6. Statistics for terrorist targets in 2015–2017.
Sustainability 13 07598 g006
Table 1. Ratio-scaled table.
Table 1. Ratio-scaled table.
Comparison of Factors i and jQuantitative Value
Equally important1
Slightly important3
More important5
Strongly important7
Extremely important9
Intermediate value of two adjacent judgments2, 4, 6, 8
Table 2. Random consistency indicator.
Table 2. Random consistency indicator.
n 3456789101112131415
R I 0.490.751.151.211.261.421.461.481.491.561.581.591.61
Table 3. Weight results of each indicator.
Table 3. Weight results of each indicator.
Indicator Degree   of   Damage   U 1 Time   U 2 Region   U 3 Target   U 4 Terrorist   Organization   U 5 Weight   W i
Degree of damage U 1 0.89270.93890.92100.92700.90450.5212
Time U 2 0.12750.13410.15350.12360.20100.0922
Region U 3 0.29760.26820.30700.30900.30150.1111
Target U 4 0.29760.16770.15350.15450.20100.1105
Terrorist organization U 5 0.09920.02240.10230.07730.10050.0550
Table 4. Indicator score details.
Table 4. Indicator score details.
FactorIndexSituationWeightScore
Damage factor U 1 Number of casualtiesDeath toll < 3 or number of critically injured < 100.40764
3 ≤ death toll < 10 or 10 ≤ number of critically injured < 506
10 ≤ death toll < 30, or 50 ≤ number of critically injured < 1008
30 ≤ death toll, or 100 ≤ number of critically injured10
Degree of property lossunknown0.11364
Direct economic loss < $1 million6
$1 million ≤ direct economic loss < $1 billion8
$1 billion ≤ direct economic loss10
Time factor U 2 DurationWithin 1 day0.09224
1–7 days6
7–30 days8
30 days–1 year10
Geographical factor U 3 Green areaOld European Union countries, such as Western European countries0.039110
Blue areaNorth America, Eastern Europe, Australia and East Asia0.031338
Yellow areaSouth America, Southeast Asia, South Asia0.02216
Orange areaMiddle East and Africa0.01334
Red areaCountries in a state of unrest, such as Iraq0.00522
Target/victim factor U 4 Government militaryGovernment, police, military, diplomacy0.045510
Public foundation classPublic utilities, transportation, telecommunications, educational institutions, airports and aircraft0.03487
OthersBusiness, journalists, citizens themselves and private property, religious figures/institutions, tourists0.03014
Terrorist organization factor U 5 Perpetrator informationCriminal gang0.027910
Noncriminal group6
Attack modeFirst type of attack (assassination, armed attack, bombing/explosion)0.017710
Second type of attack (hijacking, facility/infrastructure attack)7
Third type of attack (hand attack and other)3
Weapon typeFirst category (biochemical, nuclear, missile wand, radiation weapons)0.009410
Second category (light weapons, explosives/bombs/explosives, burning weapons)7
Third category (fake weapons, vehicles, etc.)4
Table 5. Data for ten terrorist attacks.
Table 5. Data for ten terrorist attacks.
Event NumberTime of OccurrenceEvent NameLaunch OrganizationDeath TollNumber of InjuredArms
20010911000511 November 2001September 11 attacksAl-Qaida13838191Vehicle, incendiary bomb, melee
20040311000711 March 2004Madrid subway serial bombingAl-Qaida1901500Explosives, vehicles
2004090100021 September 2004Russia’s Beslan SNO school attacked near Republic of Chechnya ruinsRiadus-Salixin Chechen Martyrs Scouting Destruction Camp Organization344727Explosives, vehicles
20090117002117 January 2009Attack on the Tora Catholic Church in the Democratic Republic of the CongoThe Army of God boycotts LRA400UnknownBomb/burning bomb, gun
2014050500535 May 2014Armed attack in the town of Gamboru NgalaBoko Holy Land315UnknownExplosives/bombs/explosives, firearms, incendiary bombs
20140610004210 June 2014Terrorists attack Iraqi Baghdad prisonExtreme organization “Islamic State”(ISIL)6700Explosives/bombs/explosives, guns
20141107000212 June 2014IS kills 1700 captured Iraqi soldiersExtreme organization “Islamic State”(ISIL)17000Explosives/bombs/explosives
2014080300593 August 2014Kidnapping of the Sinjar hostages in IraqExtreme organization “Islamic State”(ISIL)500UnknownFirearms
2015040900069 April 2015Armed attacks on civilians in the province of Anbar, IraqExtreme organization “Islamic State”(ISIL)300UnknownUnknown
Table 6. Sample data of terrorist attacks involving unidentified masterminds.
Table 6. Sample data of terrorist attacks involving unidentified masterminds.
Event NumberArea CodesAreaCode of Type of AttackType of AttackTarget/Victim Information CodeTarget/Victim InformationCode of Weapon TypeWeapon Type
2015010100013Middle East and North Africa3Bombing/explosion8Educational institution6Explosives/bombs/explosives
2015010100022Western Europe7Facility/infrastructure attack15Religious figures/institutions8Burning weapon
2015010100033Middle East and North Africa3Bombing/explosion17Terrorist/nonstate militia6Explosives/bombs/explosives
2015010100043Middle East and North Africa3Bombing/explosion1Business6Explosives/bombs/explosives
2015010100053Middle East and North Africa3Bombing/explosion14Citizens and private property6Explosives/bombs/explosives
2015010100063Middle East and North Africa3Bombing/explosion1Business6Explosives/bombs/explosives
Table 7. Standardized sample data.
Table 7. Standardized sample data.
Event NumberAreaType of AttackTarget/VictimType of Weapon
2015010100010.3181820.250.3333330.363636
2015010100020.2363640.750.6666670.545455
2015010100030.3181820.250.7619050.363636
2015010100040.3181820.2500.363636
2015010100050.3181820.250.6190480.363636
2015010100060.3181820.2500.363636
Table 8. Results for terrorist suspects.
Table 8. Results for terrorist suspects.
Event NumberSuspect No. 1Suspect No. 2Suspect No. 3Suspect No. 4Suspect No. 5
20150101000131452
20150101000243215
20150101000345321
20150101000431452
20150101000553214
20150101000631452
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Li, Z.; Li, X.; Dong, C.; Guo, F.; Zhang, F.; Zhang, Q. Quantitative Analysis of Global Terrorist Attacks Based on the Global Terrorism Database. Sustainability 2021, 13, 7598. https://doi.org/10.3390/su13147598

AMA Style

Li Z, Li X, Dong C, Guo F, Zhang F, Zhang Q. Quantitative Analysis of Global Terrorist Attacks Based on the Global Terrorism Database. Sustainability. 2021; 13(14):7598. https://doi.org/10.3390/su13147598

Chicago/Turabian Style

Li, Zhongbei, Xiangchun Li, Chen Dong, Fanfan Guo, Fan Zhang, and Qi Zhang. 2021. "Quantitative Analysis of Global Terrorist Attacks Based on the Global Terrorism Database" Sustainability 13, no. 14: 7598. https://doi.org/10.3390/su13147598

APA Style

Li, Z., Li, X., Dong, C., Guo, F., Zhang, F., & Zhang, Q. (2021). Quantitative Analysis of Global Terrorist Attacks Based on the Global Terrorism Database. Sustainability, 13(14), 7598. https://doi.org/10.3390/su13147598

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop