SAFETYLIT WEEKLY UPDATE

We compile citations and summaries of about 400 new articles every week.
RSS Feed

HELP: Tutorials | FAQ
CONTACT US: Contact info

Search Results

Journal Article

Citation

Skillicorn DB, Walther O, Leuprecht C, Zheng Q. Terrorism Polit. Violence 2021; 33(5): 1032-1054.

Copyright

(Copyright © 2021, Informa - Taylor and Francis Group)

DOI

10.1080/09546553.2019.1598388

PMID

unavailable

Abstract

This article explores the spatial and temporal diffusion of political violence in North and West Africa by endeavoring to represent a group leader's mental landscape as he contemplates strategic targeting. We assume that this representation is a combination of the physical and social geography of the target environment, and the mental and physical cost of following a seemingly random pattern of attacks. Focusing on the distance and time between attacks and taking into consideration the transaction costs that state boundaries impose, we wish to understand what constrains a group leader to attack at a location other than the one that would yield the greatest overt payoff. We leverage functional data from the Armed Conflict Location and Event Data project (ACLED) dataset that catalogs violent extremist incidents in North and West Africa since 1997 to generate a network whose nodes are administrative regions. These nodes are connected by edges of qualitatively different types: undirected edges representing geographic distance, undirected edges incorporating the costs of crossing borders, and directed edges representing consecutive attacks by the same group. We analyze the resulting network using spectral embedding techniques that are able to account fully for the different types of edges. The result is a representation of North and West Africa that depicts its empirical permeability to violence. A better understanding of how location, time, and borders condition attacks enables planning, prepositioning, and response.


Language: en

Keywords

borders; North and West Africa; Political violence; spectral embedding; terrorism

NEW SEARCH


All SafetyLit records are available for automatic download to Zotero & Mendeley
Print