Simple mathematical law benchmarks human confrontations

被引:22
作者
Johnson, Neil F. [1 ]
Medina, Pablo [2 ,3 ]
Zhao, Guannan [1 ]
Messinger, Daniel S. [4 ]
Horgan, John [5 ]
Gill, Paul [6 ]
Bohorquez, Juan Camilo [2 ,3 ]
Mattson, Whitney [4 ]
Gangi, Devon [4 ]
Qi, Hong [1 ]
Manrique, Pedro [1 ]
Velasquez, Nicolas [7 ]
Morgenstern, Ana [7 ]
Restrepo, Elvira [7 ]
Johnson, Nicholas [1 ]
Spagat, Michael [8 ]
Zarama, Roberto [2 ,3 ]
机构
[1] Univ Miami, Dept Phys, Coral Gables, FL 33124 USA
[2] Univ Los Andes, CEIBA Complex Syst Res Ctr, Bogota, Colombia
[3] Univ Los Andes, Dept Ind Engn, Bogota, Colombia
[4] Univ Miami, Dept Psychol, Coral Gables, FL 33146 USA
[5] Univ Massachusetts, Ctr Terrorism & Secur Studies, Lowell, MA 01854 USA
[6] UCL, Dept Secur & Crime Sci, London WC1E 6BT, England
[7] Univ Miami, Dept Int Studies, Coral Gables, FL 33124 USA
[8] Royal Holloway Coll, Dept Econ, Egham TW20 0EX, Surrey, England
基金
美国国家科学基金会;
关键词
DISTRIBUTIONS;
D O I
10.1038/srep03463
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Many high-profile societal problems involve an individual or group repeatedly attacking another - from child-parent disputes, sexual violence against women, civil unrest, violent conflicts and acts of terror, to current cyber-attacks on national infrastructure and ultrafast cyber-trades attacking stockholders. There is an urgent need to quantify the likely severity and timing of such future acts, shed light on likely perpetrators, and identify intervention strategies. Here we present a combined analysis of multiple datasets across all these domains which account for >100,000 events, and show that a simple mathematical law can benchmark them all. We derive this benchmark and interpret it, using a minimal mechanistic model grounded by state-of-the-art fieldwork. Our findings provide quantitative predictions concerning future attacks; a tool to help detect common perpetrators and abnormal behaviors; insight into the trajectory of a 'lone wolf'; identification of a critical threshold for spreading a message or idea among perpetrators; an intervention strategy to erode the most lethal clusters; and more broadly, a quantitative starting point for cross-disciplinary theorizing about human aggression at the individual and group level, in both real and online worlds.
引用
收藏
页数:6
相关论文
共 40 条
[1]  
[Anonymous], 2013, Exposing one of China's cyber espionage units
[2]  
[Anonymous], 1960, STAT DEADLY QUARRELS
[3]   The nature of the beast: Organizational structures and the lethality of terrorist attacks [J].
Asal, Victor ;
Rethemeyer, R. Karl .
JOURNAL OF POLITICS, 2008, 70 (02) :437-449
[5]  
Beddington John., 2012, FORESIGHT FUTURE COM
[6]   Strikes as forest fires: Chicago and Paris in the late nineteenth century [J].
Biggs, M .
AMERICAN JOURNAL OF SOCIOLOGY, 2005, 110 (06) :1684-1714
[7]   Common ecology quantifies human insurgency [J].
Camilo Bohorquez, Juan ;
Gourley, Sean ;
Dixon, Alexander R. ;
Spagat, Michael ;
Johnson, Neil F. .
NATURE, 2009, 462 (7275) :911-914
[8]   On the frequency of severe terrorist events [J].
Clauset, Aaron ;
Young, Maxwell ;
Gleditsch, Kristian Skrede .
JOURNAL OF CONFLICT RESOLUTION, 2007, 51 (01) :58-87
[9]   The Developmental Dynamics of Terrorist Organizations [J].
Clauset, Aaron ;
Gleditsch, Kristian Skrede .
PLOS ONE, 2012, 7 (11)
[10]   Power-Law Distributions in Empirical Data [J].
Clauset, Aaron ;
Shalizi, Cosma Rohilla ;
Newman, M. E. J. .
SIAM REVIEW, 2009, 51 (04) :661-703