Handbook of Computational Approaches to Counterterrorism 2012
DOI: 10.1007/978-1-4614-5311-6_7
|View full text |Cite
|
Sign up to set email alerts
|

Data-based Computational Approaches to Forecasting Political Violence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(25 citation statements)
references
References 122 publications
0
25
0
Order By: Relevance
“…The tree structure itself is critical to the analysis of comparing two data sets as we are doing in this article. Other methods, such as regression analysis (Schrodt, Yonamine, and Bagozzi, ), neural networks (Schmidhuber, ), random forests (Breiman, ), and similar prediction models may provide better predictions, but that is not the goal of this analysis. Regression analysis, neural networks, random forests, and others do not provide the characterization of the dependent variable values in terms of the independent variables and their values necessary for the comparison analyses demonstrated in this article.…”
Section: How Classification Trees Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The tree structure itself is critical to the analysis of comparing two data sets as we are doing in this article. Other methods, such as regression analysis (Schrodt, Yonamine, and Bagozzi, ), neural networks (Schmidhuber, ), random forests (Breiman, ), and similar prediction models may provide better predictions, but that is not the goal of this analysis. Regression analysis, neural networks, random forests, and others do not provide the characterization of the dependent variable values in terms of the independent variables and their values necessary for the comparison analyses demonstrated in this article.…”
Section: How Classification Trees Workmentioning
confidence: 99%
“…Schrodt, Yonamine, and Bagozzi (:145) identify four specific ways in which algorithmic approaches may be better suited than statistical models for analyzing terrorism. First, because algorithmic techniques are not sensitive to degrees of freedom, they are generally better at handling “big data” with large quantities of independent variables, including many conflict and terrorism databases used by social scientists.…”
Section: Using Classification Analysis To Study Terrorismmentioning
confidence: 99%
“…Figure 2 represents the top frequent subgraphs associated with DPCs in Brazil, Colombia, Mexico, and Venezuela. The thick edges represent more adversarial interactions (event types [11][12][13][14][15][16][17][18][19][20] whereas the thin edges represent cooperative interactions (event types 01-10). The figure shows that, in Colombia, conflicts between Rebellion, Military, and Government are frequent during domestic crises.…”
Section: Classifying Dpc Eventsmentioning
confidence: 99%
“…Methods used include discriminant analysis [17], HMMs [16], Bayesian time series forecasting [14,5,19,11], and vector auto regression (VAR) methods [10,6]. For a survey on these predictive models, we point the readers to [18].…”
Section: Introductionmentioning
confidence: 99%
“…insights) from conflict management databases containing details of international conflicts. In a survey article, Schrodt et al [28], describe a range of techniques that have been used for conflict prediction from large datasets including treebased algorithms, clustering approaches using Latent Dirichlet Analysis and hidden markov models. This paper contributes to the analysis branch, where insights from near real-time data in GDELT are obtained from disparate news sources.…”
Section: Related Workmentioning
confidence: 99%