Abstract

A large body of recent work seeking to explain the strategies and causes of terrorism exists, with hypotheses ranging from frustration-aggression theories to strategic choice to psychological dysfu...

Highlights

  • This research provides a simple, clear, evidence-based and relative measure of which kinds of groups resort to terrorism

  • Databases such as the one relied upon here (MIPT) suffer from a large number of terrorist incidents carried out by unknown perpetrators, as well as classification problems, the evidence examined here indicates that nationalist groups and Islamist movements, in that order, were the most common kinds of non-state actors that resorted to terrorism between 1998 and 2007

  • We conclude by offering tentative applications of these correlations to some of the most prevalent theoretical explanations for terrorism

Read more

Summary

Introduction

This research provides a simple, clear, evidence-based and relative measure of which kinds of groups resort to terrorism Databases such as that of MIPT suffer from a large number of terrorist incidents carried out by unknown perpetrators, as well as classification problems (groups can typically be both religious and nationalist, for instance), the evidence examined here indicates that nationalist groups and Islamist movements, in that order, were the most common kinds of non-state actors that resorted to terrorism between 1998 and 2007. Databases such as the one relied upon here (MIPT) suffer from a large number of terrorist incidents carried out by unknown perpetrators, as well as classification problems (groups can typically be both religious and nationalist, for instance), the evidence examined here indicates that nationalist groups and Islamist movements, in that order, were the most common kinds of non-state actors that resorted to terrorism between 1998 and 2007. We do this in only a preliminary sense, in order to see how a better notion of the actual “correlates of terrorism” might affect thinking and policymaking on the issue

Methods
Findings
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.