The Resource Global Terrorism Database II, 1998-2004
Global Terrorism Database II, 1998-2004
Resource Information
The item Global Terrorism Database II, 1998-2004 represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Bowdoin College Library.This item is available to borrow from 1 library branch.
Resource Information
The item Global Terrorism Database II, 1998-2004 represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Bowdoin College Library.
This item is available to borrow from 1 library branch.
- Summary
- The Global Terrorism Database II (GTD2) project was undertaken to address the fact that there is little robust empirical analysis of terrorism. Due to this lack of available empirical data regarding terrorism, the researchers sought to code and verify a previously unavailable dataset composed of terrorist events recorded for the entire world from 1998 through 2004. The goal of the GTD2 was to create a comprehensive and sound data set on global terrorism that can be used to derive methodologically robust insights into the phenomenon of terrorism and how to counter it. Information in the GTD2 was drawn entirely from publicly available, open-source materials. The criteria for incident inclusion and the coding scheme used in GTD2 were developed by a Database Development Committee, which consisted of recognized experts in terrorism and data collection. In order to be considered a "terrorist incident" the event had to have been committed by nonstate actors, had to have been violent, and intentional. In addition the act must have met two of the following three criteria: (1) The act must have been aimed at attaining a political, economic, religious, or social goal. In terms of economic goals, the exclusive pursuit of profit did not satisfy this criterion. (2) There must have been evidence of an intention to coerce, intimidate, or convey some other message to a larger audience (or audiences) than the immediate victims. (3) The action must have been outside the context of legitimate warfare activities, i.e. the act must have been outside the parameters permitted by international humanitarian law (particularly the admonition against deliberately targeting civilians or noncombatants). To produce the GTD2 an administrative staff managed both paid and volunteer researchers who monitored a variety of open sources, identified potential cases for inclusion in the database and then coded these cases. Data in this collection contain 7,154 events. The main variable categories presented in these data include: Identification Numbers, Incident Date, Incident Location, Incident Information, Attack Information, Target Information, Perpetrator Information, Perpetrator Statistics, Perpetrator Claim of Responsibility, Weapon Information, Casualty Information, Consequences, Hostage/Kidnapping Additional Information, and Source Information
- Note
-
- 1998-01-01--2004-12-31
- 22600
- Label
- Global Terrorism Database II, 1998-2004
- Title
- Global Terrorism Database II, 1998-2004
- Summary
- The Global Terrorism Database II (GTD2) project was undertaken to address the fact that there is little robust empirical analysis of terrorism. Due to this lack of available empirical data regarding terrorism, the researchers sought to code and verify a previously unavailable dataset composed of terrorist events recorded for the entire world from 1998 through 2004. The goal of the GTD2 was to create a comprehensive and sound data set on global terrorism that can be used to derive methodologically robust insights into the phenomenon of terrorism and how to counter it. Information in the GTD2 was drawn entirely from publicly available, open-source materials. The criteria for incident inclusion and the coding scheme used in GTD2 were developed by a Database Development Committee, which consisted of recognized experts in terrorism and data collection. In order to be considered a "terrorist incident" the event had to have been committed by nonstate actors, had to have been violent, and intentional. In addition the act must have met two of the following three criteria: (1) The act must have been aimed at attaining a political, economic, religious, or social goal. In terms of economic goals, the exclusive pursuit of profit did not satisfy this criterion. (2) There must have been evidence of an intention to coerce, intimidate, or convey some other message to a larger audience (or audiences) than the immediate victims. (3) The action must have been outside the context of legitimate warfare activities, i.e. the act must have been outside the parameters permitted by international humanitarian law (particularly the admonition against deliberately targeting civilians or noncombatants). To produce the GTD2 an administrative staff managed both paid and volunteer researchers who monitored a variety of open sources, identified potential cases for inclusion in the database and then coded these cases. Data in this collection contain 7,154 events. The main variable categories presented in these data include: Identification Numbers, Incident Date, Incident Location, Incident Information, Attack Information, Target Information, Perpetrator Information, Perpetrator Statistics, Perpetrator Claim of Responsibility, Weapon Information, Casualty Information, Consequences, Hostage/Kidnapping Additional Information, and Source Information
- http://library.link/vocab/creatorName
-
- LaFree, Gary
- Inter-university Consortium for Political and Social Research [distributor]
- http://library.link/vocab/relatedWorkOrContributorName
- Dugan, Laura
- Label
- Global Terrorism Database II, 1998-2004
- Note
-
- 1998-01-01--2004-12-31
- 22600
- Control code
- ICPSR22600.v1
- Governing access note
- Access restricted to subscribing institutions
- Label
- Global Terrorism Database II, 1998-2004
- Note
-
- 1998-01-01--2004-12-31
- 22600
- Control code
- ICPSR22600.v1
- Governing access note
- Access restricted to subscribing institutions
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bowdoin.edu/portal/Global-Terrorism-Database-II-1998-2004/MRxprBdhUgU/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bowdoin.edu/portal/Global-Terrorism-Database-II-1998-2004/MRxprBdhUgU/">Global Terrorism Database II, 1998-2004</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bowdoin.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.bowdoin.edu/">Bowdoin College Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Global Terrorism Database II, 1998-2004
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bowdoin.edu/portal/Global-Terrorism-Database-II-1998-2004/MRxprBdhUgU/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bowdoin.edu/portal/Global-Terrorism-Database-II-1998-2004/MRxprBdhUgU/">Global Terrorism Database II, 1998-2004</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bowdoin.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.bowdoin.edu/">Bowdoin College Library</a></span></span></span></span></div>