Author:
Zsombor Hermann Department of Criminal Psychology, Faculty of Law Enforcement, National University of Public Service Budapest Hungary; Nemzeti Közszolgálati Egyetem, Rendészettudományi Kar, Kriminálpszichológia Tanszék Budapest Magyarország

Search for other papers by Zsombor Hermann in
Current site
Google Scholar
PubMed
Close
https://orcid.org/0000-0002-6013-5551
Open access

Summary.

This article provides an overview of research on terrorism using the Global Terrorism Database (GTD). It is an open-source database containing over 200,000 terrorist events, both domestic and transnational. After identifying seven prominent journals of terrorism, data were gathered on 442 articles citing the GTD. All were published between 2008 and the beginning of 2023. An increasing trend was found in the number of articles over the examined period, supporting the growing popularity of the GTD. Popular databases containing control variables were identified in the second part of the analysis. Finally, the most common research topics were introduced through examples. These included spatiotemporal trends, case studies, suicide bombers, and lone-wolf terrorists.

Összefoglalás.

Jelen kutatás áttekintést nyújt a nyílt forrású, Global Terrorism Database (GTD) nevű adatbázis terrorizmus kutatásában történő felhasználásáról. Az adatbázist 2007-ben tették közzé, ingyenesen elérhető bárki számára. Összesen több, mint 200.000 nemzetközi és belföldi terrorcselekményről tartalmaz adatokat. Az elmúlt 15 évben világszinten az egyik legjelentősebb terrorizmussal kapcsolatos nyilvános adatbázissá vált. A kutatás során először azonosítottam a terület 7 vezető folyóiratát, majd ezekből kigyűjtöttem az összes olyan, 2008 és 2023 eleje között megjelent publikációt, melyek hivatkoznak a GTD-re (n = 442). A megjelenési dátumukat elemezve megállapítottam, hogy az évente megjelent, erre az adatbázisra hivatkozó publikációk száma növekvő tendenciát követ. Ez azonban nem volt egyenletes. 2016 előtt lassú növekedés volt megfigyelhető, 2017-re viszont egy hirtelen ugrással elkezdett meredeken emelkedni a cikkek száma.

A 442 publikáció közül 50 nem volt elérhető, az absztrakt alapján pedig nem volt egyértelműen megállapítható a felhasznált adatbázis, vizsgált változók, így ezek nem kerültek bele az elemzésbe. Szintén kivontam az elemzésből a recenziókat, bibliográfiákat, szerkesztői ajánlásokat, konferenciaelőadások összefoglalóit, illetve azokat a cikkeket, ahol a GTD csak a szerző által idézett tanulmányban szerepel. Hatvanhat esetben a szerző (1) illusztrációként használt fel adatot, (2) a GTD terrorcselekmény definícióját idézte, vagy (3) a nyilvánosan elérhető adatbázisok bemutatása során említette meg ezt.

Végezetül 207 olyan publikáció maradt, ahol a szerző a GTD-ből nyert adatokat elemzett. Ezek vizsgálata során először megállapításra került, hogy a megjelenésük a teljes mintával azonos módon mutat növekvő tendenciát. A legtöbb kutatásban több adatbázist használtak a szerzők a GTD mellett, ezek jellemzően szintén nyilvánosan elérhetők. Innen származnak általában a kontrollváltozók, melyek politikai, kulturális, demográfiai, földrajzi, biztonsági és szociökonómiai területeket fednek le. Néhányan azonban saját adatbázist építettek különböző forrásokból. Következő lépésként példákon keresztül bemutatásra kerültek gyakori vizsgált témakörök. Ezek közé tartoznak tér- és időbeli tendenciák, terrorista csoportok és azok környezetükkel és egymással való kapcsolatainak elemzései. Szintén megjelentek öngyilkos merénylők, magányos elkövetők, illetve az állam és terrorista csoportok kapcsolatának vizsgálatai. Összességében az elemzés során bizonyosságot nyert, hogy a GTD jelentős hatással van a terrorizmus kutatására.

  • 1

    Acosta, B., & Ramos, K. (2016) Introducing the 1993 Terrorism and Political Violence Dataset. Studies in Conflict & Terrorism, Vol. 40. No. 3. pp. 232–247. https://doi.org/10.1080/1057610x.2016.1184061

  • 2

    Akins, H. (2021) Delegating repression?: Pro-government militias and domestic terrorism. Dynamics of Asymmetric Conflict, Vol. 14. No. 1. pp. 72–91. https://doi.org/10.1080/17467586.2020.1821071

  • 3

    Alakoc, B. P. (2017) Competing to kill: Terrorist organizations versus lone wolf terrorists. Terrorism and Political Violence, Vol. 29. No. 3. pp. 509–532.

  • 4

    Almustafa, M. (2021) Reframing refugee crisis: A “European crisis of migration” or a “crisis of protection”? Environment and Planning C: Politics and Space, Vol. 40. No. 5. pp. 1064–1082.

  • 5

    Asal, V., Fisher, D., & Young, J. (2020) Target them with what? Why states choose different COIN strategies for different insurgent organizations. Studies in Conflict & Terrorism. https://doi.org/10.1080/1057610x.2020.1862952

  • 6

    Becker, M. (2014) Explaining lone wolf target selection in the United States. Studies in Conflict & Terrorism, Vol. 37. No. 11. pp. 959–978. https://doi.org/10.1080/1057610x.2014.952261

  • 7

    Borooah, V. K. (2009) Terrorist incidents in India, 1998–2004: A quantitative analysis of fatality rates. Terrorism and Political Violence, Vol. 21. No. 3. pp. 476–498. https://doi.org/10.1080/09546550902970165

  • 8

    Bowie, N. G. (2017) Terrorism events data: An inventory of databases and data sets, 1968-2017. Perspectives on Terrorism, Vol. 11. No. 4. pp. 50–72. https://www.jstor.org/stable/26297895

  • 9

    Bowie, N. G. (2018) 30 terrorism databases and data sets: A new inventory. Perspectives on Terrorism, Vol. 12. No. 5. pp. 51–61. https://www.jstor.org/stable/26515431

  • 10

    Bowie, N. G. (2020) A new inventory of 30 terrorism databases and data sets. Perspectives on Terrorism, Vol. 14. No. 1. pp. 54–66. https://www.jstor.org/stable/26891985

  • 11

    Bowie, N. G. (2021) 40 terrorism databases and data sets: A new inventory. Perspectives on Terrorism, Vol. 15. No. 2. pp. 147–161. https://www.jstor.org/stable/27007301

  • 12

    Braddock, K. (2014) The utility of narratives for promoting radicalization: The case of the Animal Liberation Front. Dynamics of Asymmetric Conflict, Vol. 8. No. 1. pp. 38–59. https://doi.org/10.1080/17467586.2014.968794

  • 13

    Brady, E. (2017) An analysis of patterns of change arising from the Syrian conflict: Islamic terrorism, refugee flows and political destabilization in Europe. Journal of Terrorism Research, Vol. 8. No. 1. pp. 53–67. http://doi.org/10.15664/jtr.1298

  • 14

    Choi, S. W. (2018) Does restrictive immigration policy reduce terrorism in western democracies? Perspectives on Terrorism, Vol. 12. No. 4. pp. 14–25. https://www.jstor.org/stable/26482976

  • 15

    Collins, J. (2021) A new wave of terrorism? A comparative analysis of the rise of far-right terrorism. Perspectives on Terrorism, Vol. 15. No. 6. pp. 2–22. https://www.jstor.org/stable/27090913

  • 16

    Cragin, R. K., & Padilla, P. (2017) Old becomes new again: Kidnappings by Daesh and other Salafi-Jihadists in the twenty-first century. Studies in Conflict and Terrorism, Vol. 40. No. 8. pp. 665–683. https://doi.org/10.1080/1057610x.2016.1237217

  • 17

    Doering, S., & Davies, G. (2021) The contextual nature of right-wing terrorism across nations. Terrorism and Political Violence, Vol. 33. No. 5. pp. 1071–1093. https://doi.org/10.1080/09546553.2019.1598390

  • 18

    Dugan, L., Huang, J. Y., LaFree, G., & McCauley, C. (2008) Sudden desistance from terrorism: The Armenian Secret Army for the Liberation of Armenia and the Justice Commandos of the Armenian Genocide. Dynamics of Asymmetric Conflict, Vol. 1. No. 3. pp. 231–249. https://doi.org/10.1080/17467580902838227

  • 19

    Dugan, L., & LaFree, G. (2007) Introducing the global terrorism database. Terrorism and Political Violence, Vol. 19. No. 2. pp. 181–204. https://doi.org/10.1080/09546550701246817

  • 20

    Findley, M. G., & Young J. K. (2012) More combatant groups, more terror?: Empirical tests of an outbidding logic. Terrorism and Political Violence, Vol. 24. No. 5. pp. 706–721. https://doi.org/10.1080/09546553.2011.639415

  • 21

    Godefroidt, A., & Langer, A. (2020) How fear drives us apart: Explaining the relationship between terrorism and social trust. Terrorism and Political Violence, Vol. 32. No. 7. pp. 1482–1505. https://doi.org/10.1080/09546553.2018.1482829

  • 22

    Gråtrud, H., & Skretting, V. B. (2017) Ansar al-Sharia in Libya: An enduring threat. Perspectives on Terrorism, Vol. 11. No. 1. pp. 40–53. https://www.jstor.org/stable/26297736

  • 23

    Harrow, M. (2010) Transnational dynamics and Islamist terrorism in the West, dynamics of asymmetric conflict: Pathways toward terrorism and genocide. Dynamics of Asymmetric Conflict, Vol. 3. No. 1. pp. 1–13. https://doi.org/10.1080/17467586.2010.489927

  • 24

    Hodwitz, O., & Tracy, H. (2020) President Trump’s travel ban: inciting or deterring terrorism? Behavioral Sciences of Terrorism and Political Aggression, Vol. 12. No. 4. pp. 292–306. https://doi.org/10.1080/19434472.2019.1701525

  • 25

    Homolar, A., & A. Rodríguez-Merino, P. (2019) Making sense of terrorism: A narrative approach to the study of violent events. Critical Studies on Terrorism, Vol. 12. No. 4. pp. 1–21. https://doi.org/10.1080/17539153.2019.1585150

  • 26

    Jetter, M. (2019) More bang for the buck: Media coverage of suicide attacks. Terrorism and Political Violence, Vol. 31. No. 4. pp. 779–799. https://doi.org/10.1080/09546553.2017.1288112

  • 27

    Kearns, E. M. (2021) When to take credit for terrorism? A cross-national examination of claims and attributions. Terrorism and Political Violence, Vol. 33. No. 1. pp. 164–193. https://doi.org/10.1080/09546553.2018.1540982

  • 28

    Kirisci, M. (2020) Fighting for survival: responding to state capacity and terror group end. Critical Studies on Terrorism, Vol. 13. No. 2. pp. 312–336. https://doi.org/10.1080/17539153.2019.1708040

  • 29

    LaFree, G., Dugan, L., & Miller, E. (2015) Putting terrorism in context: lessons learned from the Global Terrorism Database. New York: Routledge. ISBN 9780415671422.

  • 30

    Lum, C., Kennedy, L. W., & Sherley, A. J. (2006) The effectiveness of counter-terrorism strategies. Campbell Systematic Reviews, Vol. 2. No. 1. 1–50. https://doi.org/10.4073/csr.2006.2

  • 31

    Mahoney, C. W. (2020) Empty threats: How extremist organizations bluff in terrorist campaigns. Studies in Conflict & Terrorism, Vol. 43. No. 12. pp. 1043–1063. https://doi.org/10.1080/1057610x.2018.1514093

  • 32

    Mantzikos, I. (2014) Boko Haram attacks in Nigeria and neighbouring countries: A chronology of attacks. Perspectives on Terrorism, Vol. 8. No. 6. pp. 63–81. https://www.jstor.org/stable/26297293

  • 33

    Matesan, I. E., & Berger, R. (2016) Blunders and blame: How armed non-state actors react to their mistakes. Studies in Conflict & Terrorism, Vol 40. No. 5. pp. 376–398. https://doi.org/10.1080/1057610x.2016.1210891

  • 34

    Mroszczyk, J. (2019) To die or to kill? An analysis of suicide attack lethality. Terrorism and Political Violence, Vol. 31. No. 2. pp. 346–366.

  • 35

    Mueller, J. C. (2018) The evolution of political violence: The case of Somalia’s Al-Shabaab. Terrorism and Political Violence, Vol. 30. No. 1. pp. 116–141. https://doi.org/10.1080/09546553.2016.1228632

  • 36

    Nesser, P. (2012) Research note: Single actor terrorism: Scope, characteristics and explanations. Perspectives on Terrorism, Vol 6. No. 6. pp. 61–73. https://www.jstor.org/stable/26296894

  • 37

    Nilsson, M. (2018) The logic of suicide terrorism: Does regime type affect the choice of targets? Behavioral Sciences of Terrorism and Political Aggression, Vol. 10. No. 2. pp. 176–185. https://doi.org/10.1080/19434472.2017.1367707

  • 38

    Oak, G. S. (2010) Jemaah Islamiyah’s fifth phase: The many faces of a terrorist group. Studies in Conflict & Terrorism, Vol. 33. No. 11. pp. 989–1018. https://doi.org/10.1080/1057610x.2010.514697

  • 39

    Oriola, T. B. (2017) “Unwilling cocoons”: Boko Haram’s war against women. Studies in Conflict & Terrorism, Vol. 40. No. 2. pp. 99–121. https://doi.org/10.1080/1057610x.2016.1177998

  • 40

    Phillips, B. J. (2018) Terrorist tactics by criminal organizations: The Mexican case in context. Perspectives on Terrorism, Vol. 12. No. 1. pp. 46–63. https://www.jstor.org/stable/26343745

  • 41

    Piazza, J. A. (2017) Repression and Terrorism: A Cross-National Empirical Analysis of Types of Repression and Domestic Terrorism. Terrorism and Political Violence, Vol. 29. No. 1. pp. 102–118. https://doi.org/10.1080/09546553.2014.994061

  • 42

    Piazza, J. A. (2012) The opium trade and patterns of terrorism in the provinces of Afghanistan: An empirical analysis. Terrorism and Political Violence, Vol. 24. No. 2. pp. 213–234. https://doi.org/10.1080/09546553.2011.648680

  • 43

    Sageman, M. (2014) The stagnation in terrorism research. Terrorism and Political Violence, Vol. 26. No. 4. pp. 565–580. https://doi.org/10.1080/09546553.2014.895649

  • 44

    Schmid, A. P., Forest, J. J. F., & Lowe, T. (2021) Terrorism studies: A glimpse at the current state of research (2020/2021). Perspectives on Terrorism, Vol. 15. No. 3. pp. 142–152. https://www.jstor.org/stable/27030887

  • 45

    Schmid, A., & Jongman, A. (1988) Political terrorism: A new guide to actors, authors, concepts, data bases, theories and literature. Oxford: North Holland.

  • 46

    Schuurman, B. (2018) Research on terrorism, 2007–2016: A review of data, methods, and authorship. Terrorism and Political Violence, Vol. 32. No. 5. pp. 1011–1026. https://doi.org/10.1080/09546553.2018.1439023

  • 47

    Schuurman, B. (2019) Topics in terrorism research: Reviewing trends and gaps, 2007-2016. Critical Studies on Terrorism, Vol. 12. No. 3. pp. 463–480. https://doi.org/10.1080/17539153.2019.1579777

  • 48

    Schuurman, B., & Eijkman, Q. (2013) Moving terrorism research forward: The crucial role of primary sources. International Centre for Counter-Terrorism. https://www.jstor.org/stable/resrep17493

  • 49

    Selvadura, S. D., & Smith, M. L. R. (2013) Black Tigers, Bronze Lotus: The evolution and dynamics of Sri Lanka’s strategies of dirty war. Studies in Conflict & Terrorism, Vol. 36. No. 7. pp. 547–572. https://doi.org/10.1080/1057610x.2013.793617

  • 50

    Shkolnik, M. (2021) Rival consolidation in nascent insurrections: Why some militant groups wage sustained insurgencies. Perspectives on Terrorism, Vol. 15. No. 4. pp. 11–26. https://www.jstor.org/stable/27044232

  • 51

    Silke, A. (2001) The devil you know: Continuing problems with research on terrorism. Terrorism and Political Violence, Vol. 32. No. 5. pp. 1–14. https://doi.org/10.1080/09546553.2018.1559836

  • 52

    Singh, I. (2021) 20 Databases on (violent and armed) conflicts. Perspectives on Terrorism, Vol. 15. No. 2. pp. 162–171. https://www.jstor.org/stable/27007302

  • 53

    Sjah, A. I. G. (2008) Tracing Al Shabaab’s decision to cooperate with Al Qaeda in Somalia. Journal of Terrorism Research, Vol. 5. No. 1. pp 35–45. http://doi.org/10.15664/jtr.827

  • 54

    Skretting, V. B. (2020) Al-Qaida in the Islamic Maghrib’s expansion in the Sahara: New insights from primary sources. Studies in Conflict & Terrorism. https://doi.org/10.1080/1057610X.2020.1822593

  • 55

    START (National Consortium for the study of terrorism and responses to terrorism) (2022) Global Terrorism Database 1970–2020 [data file]. https://www.start.umd.edu/gtd

  • 56

    Walther, O. J., Radil, S. M., Russell, D. G., & Trémolières, M. (2021) Introducing the spatial conflict dynamics indicator of political violence. Terrorism and Political Violence. https://doi.org/10.1080/09546553.2021.1957846

  • 57

    Webb, J. J., & Cutter, S. L. (2009) The geography of U.S. terrorist incidents, 1970–2004. Terrorism and Political Violence, Vol. 21. No. 3. pp. 428–449. https://doi.org/10.1080/09546550902950308

  • 58

    Weeraratne, S. (2017) Theorizing the expansion of the Boko Haram insurgency in Nigeria. Terrorism and Political Violence, Vol. 29. No. 4. pp. 610–634. https://doi.org/10.1080/09546553.2015.1005742

  • 59

    Young, J. K., & Dugan, L. (2014) Survival of the fittest: Why terrorist groups endure. Perspectives on Terrorism, Vol. 8. No. 2. pp. 22–23. https://www.jstor.org/stable/26297133

  • Collapse
  • Expand

Editor-in-Chief:

Founding Editor-in-Chief:

  • Tamás NÉMETH

Managing Editor:

  • István SABJANICS (Ministry of Interior, Budapest, Hungary)

Editorial Board:

  • Attila ASZÓDI (Budapest University of Technology and Economics)
  • Zoltán BIRKNER (University of Pannonia)
  • Valéria CSÉPE (Research Centre for Natural Sciences, Brain Imaging Centre)
  • Gergely DELI (University of Public Service)
  • Tamás DEZSŐ (Migration Research Institute)
  • Imre DOBÁK (University of Public Service)
  • Marcell Gyula GÁSPÁR (University of Miskolc)
  • József HALLER (University of Public Service)
  • Charaf HASSAN (Budapest University of Technology and Economics)
  • Zoltán GYŐRI (Hungaricum Committee)
  • János JÓZSA (Budapest University of Technology and Economics)
  • András KOLTAY (National Media and Infocommunications Authority)
  • Gábor KOVÁCS (University of Public Service)
  • Levente KOVÁCS buda University)
  • Melinda KOVÁCS (Hungarian University of Agriculture and Life Sciences (MATE))
  • Miklós MARÓTH (Avicenna Institue of Middle Eastern Studies )
  • Judit MÓGOR (Ministry of Interior National Directorate General for Disaster Management)
  • József PALLO (University of Public Service)
  • István SABJANICS (Ministry of Interior)
  • Péter SZABÓ (Hungarian University of Agriculture and Life Sciences (MATE))
  • Miklós SZÓCSKA (Semmelweis University)

Ministry of Interior
Science Strategy and Coordination Department
Address: H-2090 Remeteszőlős, Nagykovácsi út 3.
Phone: (+36 26) 795 906
E-mail: scietsec@bm.gov.hu

DOAJ

2023  
CrossRef Documents 32
CrossRef Cites 15
Days from submission to acceptance 59
Days from acceptance to publication 104
Acceptance Rate 81%

2022  
CrossRef Documents 38
CrossRef Cites 10
Days from submission to acceptance 54
Days from acceptance to publication 78
Acceptance Rate 84%

2021  
CrossRef Documents 46
CrossRef Cites 0
Days from submission to acceptance 33
Days from acceptance to publication 85
Acceptance Rate 93%

2020  
CrossRef Documents 13
CrossRef Cites 0
Days from submission to acceptance 30
Days from acceptance to publication 62
Acceptance Rate 93%

Publication Model Gold Open Access
Submission Fee none
Article Processing Charge none

Scientia et Securitas
Language Hungarian
English
Size A4
Year of
Foundation
2020
Volumes
per Year
1
Issues
per Year
4
Founder Academic Council of Home Affairs and
Association of Hungarian PhD and DLA Candidates
Founder's
Address
H-2090 Remeteszőlős, Hungary, Nagykovácsi út 3.
H-1055 Budapest, Hungary Falk Miksa utca 1.
Publisher Akadémiai Kiadó
Publisher's
Address
H-1117 Budapest, Hungary 1516 Budapest, PO Box 245.
Responsible
Publisher
Chief Executive Officer, Akadémiai Kiadó
Applied
Licenses
CC-BY 4.0
CC-BY-NC 4.0
ISSN ISSN 2732-2688 (online), 3057-9759 (print)
   

Monthly Content Usage

Abstract Views Full Text Views PDF Downloads
Jul 2024 0 72 58
Aug 2024 0 158 54
Sep 2024 0 69 59
Oct 2024 0 176 66
Nov 2024 0 126 59
Dec 2024 0 36 40
Jan 2025 0 30 23