Studying Terrorism Empirically: What We Know About What We Don't Know

被引:24
作者
Safer-Lichtenstein, Aaron [1 ]
LaFree, Gary [2 ]
Loughran, Thomas [1 ]
机构
[1] Univ Maryland, Dept Criminol & Criminal Justice, College Pk, MD 20740 USA
[2] Univ Maryland, Criminol & Criminal Justice, College Pk, MD 20740 USA
关键词
point identification; no assumption bounds; data validity; missing data; domestic extremism; terrorism data; VIOLENCE; ATTACKS; ISSUES;
D O I
10.1177/1043986217697873
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
Although the empirical and analytical study of terrorism has grown dramatically in the past decade and a half to incorporate more sophisticated statistical and econometric methods, data validity is still an open, first-order question. Specifically, methods for treating missing data often rely on strong, untestable, and often implicit assumptions about the nature of the missing values. We draw on Manski's idea of no-assumption bounds to demonstrate the vulnerability of empirical results to different tactics for treating missing cases. Using a recently available open-source database on political extremists who radicalized in the United States, we show how point estimates of basic conditional probabilities can vary dramatically depending on the amount of missing data in certain variables and the methods used to address this issue. We conclude by advocating for researchers to be transparent when building analytical models about the assumptions they are making about the nature of the data and their implications for the analysis and its interpretation.
引用
收藏
页码:273 / 291
页数:19
相关论文
共 63 条
[1]  
Apel R., 2017, The handbook of the criminology of terrorism, V1st, P276, DOI DOI 10.1002/9781118923986.CH18
[2]   The nature of the beast: Organizational structures and the lethality of terrorist attacks [J].
Asal, Victor ;
Rethemeyer, R. Karl .
JOURNAL OF POLITICS, 2008, 70 (02) :437-449
[3]   Microcycles of Violence: Evidence from Terrorist Attacks by ETA and the FMLN [J].
Behlendorf, Brandon ;
LaFree, Gary ;
Legault, Richard .
JOURNAL OF QUANTITATIVE CRIMINOLOGY, 2012, 28 (01) :49-75
[4]  
Borum R., 2011, Journal of Strategic Security, V4, P1, DOI [10.5038/1944-0472.4.4.2, DOI 10.5038/1944-0472.4.4.2]
[5]  
Borum R., 2011, Journal of Strategic Security, V4, P7, DOI [10.5038/1944-0472.4.4.1, DOI 10.5038/1944-0472.4.4.1, 10.5038/1944-0472.4.4.1.]
[6]   American Terrorism and Extremist Crime Data Sources and Selectivity Bias: An Investigation Focusing on Homicide Events Committed by Far-Right Extremists [J].
Chermak, Steven M. ;
Freilich, Joshua D. ;
Parkin, William S. ;
Lynch, James P. .
JOURNAL OF QUANTITATIVE CRIMINOLOGY, 2012, 28 (01) :191-218
[7]  
Crenshaw Martha., 2017, COUNTERING TERRORISM
[8]   How al-Qaida ends - The decline and demise of terrorist groups [J].
Cronin, Audrey Kurth .
INTERNATIONAL SECURITY, 2006, 31 (01) :7-+
[9]   Violent Radicalization in Europe: What We Know and What We Do Not Know [J].
Dalgaard-Nielsen, Anja .
STUDIES IN CONFLICT & TERRORISM, 2010, 33 (09) :797-814
[10]  
Dugan L., 2016, HDB CRIMINOLOGY TERR, P189