Skip Navigation Links.
Collapse <span class="m110 colortj mt20 fontw700">Volume 12 (2024)</span>Volume 12 (2024)
Collapse <span class="m110 colortj mt20 fontw700">Volume 11 (2023)</span>Volume 11 (2023)
Collapse <span class="m110 colortj mt20 fontw700">Volume 10 (2022)</span>Volume 10 (2022)
Collapse <span class="m110 colortj mt20 fontw700">Volume 9 (2021)</span>Volume 9 (2021)
Collapse <span class="m110 colortj mt20 fontw700">Volume 8 (2020)</span>Volume 8 (2020)
Collapse <span class="m110 colortj mt20 fontw700">Volume 7 (2019)</span>Volume 7 (2019)
Collapse <span class="m110 colortj mt20 fontw700">Volume 6 (2018)</span>Volume 6 (2018)
Collapse <span class="m110 colortj mt20 fontw700">Volume 5 (2017)</span>Volume 5 (2017)
Collapse <span class="m110 colortj mt20 fontw700">Volume 4 (2016)</span>Volume 4 (2016)
Collapse <span class="m110 colortj mt20 fontw700">Volume 3 (2015)</span>Volume 3 (2015)
Collapse <span class="m110 colortj mt20 fontw700">Volume 2 (2014)</span>Volume 2 (2014)
Collapse <span class="m110 colortj mt20 fontw700">Volume 1 (2013)</span>Volume 1 (2013)
American Journal of Applied Mathematics and Statistics. 2019, 7(5), 161-166
DOI: 10.12691/AJAMS-7-5-1
Original Research

Analysis of Suspects of Terrorist Incidents by Unknown Perpetrator

Qingyun Wang1 and Yayuan Xiao2,

1School of Mathematics and Computer Science, Gannan Normal University, Ganzhou, China, 341000

2Department of Mathematical Sciences, Ball State University, Muncie, USA, 47306

Pub. Date: September 17, 2019

Cite this paper

Qingyun Wang and Yayuan Xiao. Analysis of Suspects of Terrorist Incidents by Unknown Perpetrator. American Journal of Applied Mathematics and Statistics. 2019; 7(5):161-166. doi: 10.12691/AJAMS-7-5-1

Abstract

Terrorism is a common threat to humanity. An in-depth analysis of data related to terrorist attacks provides a deeper knowledge of terrorism that is valuable to counter-terrorism. In this paper, we analyzed the terrorist incident data in the United States in 1998-2017. Through cluster analysis, we speculated the possible suspects of terrorist incidents by unknown perpetrators and analyzed the credibility of those results.

Keywords

terrorist attack, suspect, incident data, cluster, k-mode

Copyright

Creative CommonsThis work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

References

[1]  Jackson, R. (2010). An Argument for Terrorism. Perspectives on Terrorism. Vol 2. No 2. Retrieved from http://www.terrorismanalysts.com/pt/index.php/pot/article/view/.
 
[2]  Alex P. Schmid and Albert J. Jongman, Political Terrorism: A New Guide to Actors, Authors, Concepts, Data Bases, Theories, and Literature (Amsterdam, New Brunswick: SWIDOC, Transaction Books, 1988), 179.
 
[3]  Jackson, R. (2007). The core commitments of critical terrorism studies. European Political Science. 6(3): 244-251.
 
[4]  Borum, R., (2004). "Psychology of Terrorism". Mental Health Law & Policy Faculty Publications. 571.
 
[5]  Borum, R., (2010). "Understanding Terrorist Psychology". Mental Health Law & Policy Faculty Publications. 576.
 
[6]  Crenshaw, M. (2000). The Psychology of Terrorism: An Agenda for the 21st Century. Political Psychology, 21(2), 405-420.
 
[7]  Mythen, G., & Walklate, S. (2006). "CRIMINOLOGY AND TERRORISM: Which Thesis? Risk Society or Governmentality?". The British Journal of Criminology, 46(3), 379-398.
 
[8]  Gary LaFree Joshua D. Freilich. 2016. The Handbook of the Criminology of Terrorism. West Sussex: Wiley Blackwell.
 
[9]  Hudson, R.A. (1999). The Sociology and Psychology of Terrorism: Who becomes a Terrorist and why? Washington, DC: Library of. Congress. 53.
 
[10]  Turk, A. T. (2004). Sociology of Terrorism. Annual Review of Sociology, 30, 271-286.
 
[11]  Stephen E. Fienberg, and Galit Shmueli. (2005). Statistical Issues and Challenges Associated with the Rapid Detection of Terrorist Outbreaks. Statistics in Medicine 24: 513-529. Statistics in medicine. 24. 513-29.
 
[12]  Brian M. Jenkins, Henry H. Willis, and Bing Han, Do Significant Terrorist Attacks Increase the Risk of Further Attacks? Initial Observations from a Statistical Analysis of Terrorist Attacks in the United States and Europe from 1970 to 2013. Santa Monica, CA: RAND Corporation, 2016.
 
[13]  G. Li, J. Hu, Y. Song, Y. Yang and H. Li, "Analysis of the Terrorist Organization Alliance Network Based on Complex Network Theory," in IEEE Access, vol. 7, pp. 103854-103862, 2019.
 
[14]  Vivek Kumar1, Manuel Mazzara, Maj. G.R.A. Messina, JooYoung Lee. A Conjoint Application of Data Mining Techniques for Analysis of Global Terrorist Attacks - Prevention and Prediction for Combating Terrorism.
 
[15]  Horgan, J. (1997). Issues in Terrorism Research. The Police Journal, 70(3), 193-202.
 
[16]  Andrew Silke, “The Devil You Know: Continuing Problems with Research on Terrorism,” Terrorism and Political Violence 13, no. 4 (2001): 1-14.
 
[17]  Bart Schuurman (2018) Research on Terrorism, 2007–2016: A Review of Data, Methods, and Authorship. Terrorism and Political Violence.
 
[18]  MacQueen, J. Some methods for classification and analysis of multivariate observations. Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, Volume 1: Statistics, 281-297, University of California Press, Berkeley, Calif., 1967.
 
[19]  Huang, Z. & Ng, M. Journal of Classification (2003) 20: 257.