About
76
Publications
54,746
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,223
Citations
Current institution
Additional affiliations
August 2007 - present
August 2001 - August 2007
August 1999 - May 2001
Education
August 1996 - May 1998
August 1995 - August 1999
August 1993 - May 1995
Publications
Publications (76)
Background
Criminal justice agencies are well positioned to help prevent the radicalisation of individuals and groups, stop those radicalised from engaging in violence, and reduce the likelihood of terrorist attacks. This Evidence and Gap Map (EGM) presents the existing evidence and gaps in the evaluation research.
Objectives
To identify the exist...
As tens of thousands swarmed the US Capitol Grounds on January 6th, 2021, to oppose the election of Joe Biden as President, thousands among them assaulted officers and breached the building to stop the certification of the election results, leading to nine deaths and hundreds of injuries. Despite being an act of terrorism and evidence that far-righ...
This is the protocol for a Campbell systematic review. The objectives are as follows: to identify the existing evidence that considers the effectiveness of criminal justice interventions in preventing terrorism and radicalisation and to identify existing gaps in the evidence where new primary research could be undertaken and where future synthesis...
The increased incidence of natural disasters may be among the major forces driving crime over the coming century. Indeed, pre- vious research suggests that natural disasters provide the catalyst for acts of terrorism. However, because governments can choose how they respond to natural disasters, they might be able to select actions that would mitig...
How do expressions of support or opposition by the U.S. federal government, influence violent hate crimes against specific racial and ethnic minorities? In this article, we test two hypotheses derived from Blalock's (1967) conceptualization of intergroup power contests. The political threat hypothesis predicts that positive government attention tow...
Objectives
In this study, we examine the effect of both the costs and benefits of perpetration, along with the rewards of abstention, on the behavior of a uniquely rational, yet frequent perpetrator of ideologically-motivated crime: the radical eco-movement.
Methods
We combine data on U.S. federal government actions and incidents perpetrated by th...
Theory is an integral part of the scientific exploration of terrorism as it is any phenomenon. A well-defined and articulated theory enables prejudices, superstitions, and unquestioned assumptions to be exposed and criticized, surmounting foundational barriers for scientific progress (Benton and Craib 2010). As researchers approach “everything in t...
The central goal of The Oxford Handbook of Terrorism is to systematically introduce scholars and practitioners to state-of-the-art approaches, methods, and issues in studying this vital phenomenon. This Handbook attempts to give structure and direction to the fast-growing but somewhat disjointed field of terrorism studies. The volume locates terror...
Although political violence has proven to be difficult for governments to manage, predict or control, previous research on the impact of relevant federal government actions and US presidential rhetoric on terrorist attacks and hate crimes demonstrates that what the US government does matters in ways that are both expected and unexpected. In the US,...
In this chapter we consider different ways to measure terrorism, beginning with the most common methods used to measure crime (official statistics, self-report surveys, and victimization surveys). These strategies provide valuable information on subsets of terrorist activity, but fail to provide an objective depiction of world-wide terrorism. We th...
Theoretically understanding the reasons behind the rise and persistence of terrorism and the ways that it can be stopped is one of the more salient political priorities in the early 21st century and has been a growing focus within the field of criminology since the late 20th century. Rigorous scholarship relies on theoretical explanations and their...
PurposeThe paucity of studies that examine women’s criminal careers, particularly beyond the period of young adulthood, has made it difficult for scholars to determine whether developmental pathways—especially precursors of adult-onset offending—vary. This paper examines the onset of offending among women, from childhood to adulthood. Methods
We dr...
How does Canada fight terrorism, and to what effect? In this article, we introduce an original data set of all reported actions taken by the Canadian government in relation to both domestic and international terror groups between 1985 and 2013. Data include conciliatory and repressive, verbal and physical, and discriminate and indiscriminate action...
Terrorism has become more salient in recent decades after the devastating attacks in the United States on September 11, 2001. As a response to those attacks, the US federal government has concentrated resources to stop terrorism and organized a network of academic researchers to better understand it. One result of this effort is the development of...
PurposePrior to 9/11 criminologists paid relatively little attention to the study of terrorism. In 2004, the authors argued that criminologists had much to offer to advance our understanding of terrorism and urged scholars to conduct such research. This chapter accounts the theoretical and methodological contributions by the field of criminology to...
The explosions on April 15, 2013 during the Patriot’s Day Marathon in Boston mark the first major terrorist attack in the United States since 9/11 and the first time since 1996 that terrorists targeted a major US sporting event. This chapter reviews events before and after the bombing to explore strategies to reduce risk and harm at sporting events...
Terrorism event databases provide systematized descriptive information about terrorist attacks from unclassified sources making the attack the unit of analysis. These databases generally follow the classic journalistic format of providing information on who is responsible for an attack, what happened, where it happened, when it happened and to the...
With the persistent alarm being raised about terrorist violence by the media and government officials it is unsurprising that scholarship in this area has grown well beyond its traditional disciplinary boundaries (i.e., political science and international relations). As scholars from disciplines such as criminology [27, 30], computer science [11, 1...
This study investigates the situational characteristics that determine the presence and severity of injury in incidents of assaultive violence. The analysis uses merged data from the National Crime Victimization Survey and the Supplementary Homicide Reports for the years 1992-2008, in order to model the determinants of victim injury. The analysis i...
This article is concerned with terrorism and it presents comprehensive data on global terrorist attacks for rigorous policy analysis. It begins by summarizing efforts to measure terrorism and provides an overview of the distribution of global terrorist violence over time and space using the Global Terrorism Database (GTD) data. This article then tu...
Asal, Victor et al. (2012) Killing Civilians or Holding Territory? How to Think about Terrorism. International Studies Review, doi:10.1111/j.1468‐2486.2012.01127.x
Despite the centrality of situational variables to crime theories, they remain uncommon in criminology. Based on the hypotheses drawn from the literature on situational determinants of crime, we examine whether aerial hijackings perpetrated by terrorists are situationally distinct from other aerial hijackings. We define terrorist hijackings as thos...
Rational choice approaches to reducing terrorist violence would suggest raising the costs of terrorism through punishment, thereby reducing the overall expected utility of terrorism. In this article, we argue that states should also consider raising the expected utility of abstaining from terrorism through rewards. We test effects of repressive (or...
Despite concerns about the growing threat posed by domestic radical environmental and animal rights groups to the United States, there has been little systematic quantitative evidence depicting the characteristics of their attacks over time. In this paper we analyze data on 1,069 criminal incidents perpetrated by environmental and animal rights ext...
Rational choice perspectives maintain that seemingly irrational behavior on the part of terrorist organizations may nevertheless
reflect strategic planning. In this paper we examine spatial and temporal patterns of terrorist attacks by the Spanish group
ETA between 1970 and 2007. Our analysis is guided by a public announcement by ETA in 1978 that t...
In this chapter, we introduce two innovative methodologies that were first used in the field of criminology and have then
been applied to systematically analyze terrorism over time. The first innovation, group-based trajectory analysis, presents
the big picture of terrorism by grouping countries or terrorist organizations with similar attack patter...
An important pursuit by a body of criminological research is its endeavor to determine whether interventions or policy changes
effectively achieve their intended goals. Because theories predict that interventions could either improve or worsen outcomes,
estimators designed to improve the accuracy of identifying program or policy effects are in dema...
Democratic regimes have been linked to terrorism for contending reasons, with some scholars claiming democracy increases terrorism and others claiming it decreases terror. Corroborating evidence has been used for both relationships leading to the following puzzle: why do some democratic regimes seem to foster terrorism while others do not? We offer...
Criminology can easily be characterized by its investigation of change. We need to understand the conditions that facilitate
the change in order to inform policy makers on how to reduce crime or improve social welfare. Yet, much of the published research
in our field relies on cross-sectional data. As most criminological research questions are inhe...
How effective is repression relative to more conciliatory counterterrorist policies? The literature on counterterrorism identifies multiple different expectations about the relationship between repression and terrorist attacks. On the one hand, some scholars argue that repression reduces terrorism. Others argue that repressive policies exacerbate g...
Despite growing international concern about terrorism, until recently, very little was known about worldwide risk patterns for terrorist attacks. In this paper, we are especially interested in determining the extent to which terrorism is concentrated at the country level over time and whether different measures of terrorism (total, attributed and f...
Despite growing international concern about terrorism, until recently, very little was known about worldwide risk patterns for terrorist attacks. In this paper, we are especially interested in determining the extent to which terrorism is concentrated at the country level over time and whether different measures of terrorism (total, attributed and f...
In this paper we examine the trajectories of two Armenian terrorist groups: the Armenian Secret Army for the Liberation of Armenia (ASALA) and the Justice Commandos of the Armenian Genocide (JCAG). Both groups began in the mid-1970s and by the early 1980s had become extremely active. However, shortly afterwards, attacks and fatalities attributed to...
Terrorism is a form of crime. Yet compared to most types of crime, terrorism poses unique data collection challenges. As a
result, even basic descriptive questions about terrorism have been difficult or impossible to answer: What are the long-term
trends in terrorist attacks? Is the number of fatalities associated with terrorist attacks increasing...
Since philosophers Beccaria and Bentham, criminologists have been concerned with predicting how governmental attempts to maintain lawful behavior affect subsequent rates of criminal violence. In this article, we build on prior research to argue that governmental responses to a specific form of criminal violence—terrorism—may produce both a positive...
In this chapter, we draw direct comparisons between corporate crime and terrorism in order to improve our understanding on
how to better control each. We acknowledge obvious differences between the corporate criminal and the terrorist organization,
but also raise important similarities between them. Namely, corporations and terrorist organizations...
Social and behavioral research on terrorism has expanded dramatically. However, theoretical work that incorporates terrorism and collection of valid data on it has lagged behind theoretical work on other criminological subjects. Theorizing has been dominated by deterrence perspectives. Threats of severe consequence for terrorist acts in general sho...
Some researchers suggest that crime pathways are gendered and that different paths may be revealed depending on the point of contact with the criminal justice system. Drawing from the feminist and age-of-onset literatures, we examine the life experiences of a sample of ‘high-risk’ women to assess whether their offending pathways into jail are consi...
Despite the growth in research examining direct economic impacts of terrorism, the indirect impact of terrorism on the stability of local economies has generally been overlooked. Using panel data regression models and the most comprehensive open source database on terrorism currently available to researchers, the paper examines the impact of terror...
Compared to most types of criminal violence, terrorism poses special data collection challenges. In response, there has been growing interest in open source terrorist event data bases. One of the major problems with these data bases in the past is that they have been limited to international events—those involving a national or group of nationals f...
Much debate centers on the use of offender profiling as a technique to differentiate criminals from law-abiding citizens. Profiling advocates argue that it is appropriate to reference past experiences and information about known offenders to identify behavioral and demographic correlates that can then be applied to a given population of offenses or...
While the study of terrorism has expanded dramatically since the 1970s, most analyses are limited to qualitative case studies or quantitative analyses of international incidents only—which comprise a very small proportion of all terrorist events. Until now, empirical data on both domestic and international terrorist events have not existed. We have...
Research Summary: This research uses data from the National Crime Victimization Survey to test whether legislation affects domestic violence, police involvement, and arrest. Findings suggest that most laws do reduce the chances of family or intimate violence. Fewer appear to influence police involvement, and none relate to more arrest. This suggest...
Only a small body of research addresses the impact of criminal victimization on moving (Skogan, 1990; Taub et al. 1984). Knowledge of this under-researched relationship is important for three reasons. First, moving is costly to the victim both in monetary and psychological terms. Second, if a victimization-mobility relationship exists, then it may...
Although much has been learned in recent years about the victimization experiences of women, there remains a considerable knowledge gap with respect to the victimization of women of different racial and ethnic backgrounds. In order to confront this issue, we use the large number of cases available in the National Crime Victimization Survey (1992–20...
Using data that combines information from the Federal Aviation Administration, the RAND Corporation and a newly developed database on global terrorist activity, we are able to examine trends in 1,101 attempted aerial hijackings that occurred around the world from 1931 to 2003. We have especially complete information for 828 hijackings that occurred...
This research attempts to elaborate a routine activity model of violent victimization by incorporating an explicit rational choice perspective on potential targets’ decision making to avoid violent encounters. We propose that the costs associated with a violent attack and the probability of offender retaliation depend on whether the offender's targ...
Using data that combines information from the Federal Aviation Administration, the RAND Corporation, and a newly developed database on global terrorist activity, we are able to examine trends in 1,101 attempted aerial hijackings that occurred around the world from 1931 to 2003. We have especially complete information for 828 hijackings that occurre...
Shoplifting is one of the most common and costly crimes, yet little data exist to determine reliably characteristics of the typical shoplifter or the modus operandi of the crime. It is a crime that has most often been studied using official, secondary data provided by either retail security personnel or law enforcement officers. Reliability issues...
Dual arrests in family violence cases have increased following passage of proarrest laws. This study examined the relationship between officers’perceptions of their departmental policies and arrest outcomes. Each officer was given 1 of 6 hypothetical scripts that varied as to whether the wife only was injured or the wife and husband were injured. T...
The abstract for this document is available on CSA Illumina.To view the Abstract, click the Abstract button above the document title.
Rates of homicide involving intimate partners have declined substantially over the past 25 years in the United States, while public awareness of and policy responses to domestic violence have grown. To what extent has the social response to domestic violence contributed to the decline in intimate-partner homicide? We evaluate the relationship betwe...
Longitudinal analysis in criminology and other social sciences has become an important research tool because it allows us to draw conclusions from observing how multiple units change over time. Unfortunately, its results are more vulnerable to potential influences of unusual observational units or periods of time. Current leverage diagnostics are d...
This study investigated the effectiveness of a popular batterers's intervention program in reducing repeated violence among men who were convicted of misdemeanor domestic violence. A classical experimental design randomly assigned all 404 male defendants in Broward County Courthouse into an experimental (one-year probation and court-mandated counse...
This article explains the two-decades-long decline in the intimate partner homicide rate in the United States in terms of three factors that reduce exposure to violent relationships: shifts in marriage, divorce, and other factors associated with declining domesticity; the improved economic status of women; and increases in the availability of domes...
How effective is repression relative to more conciliatory counterterrorist policies? The literature on counterterrorism identifies multiple different expectations about the relationship between repression and terrorist attacks. On the one hand, some scholars argue that repression reduces terrorism. Others argue that repressive policies exacerbate g...
Abstract will be provided by author.
The Centers for Disease Control (CDC) estimates that over 5 million intimate partner assaults are perpetrated against women each year, and they lose more than 8 million days of work annually. Expanding Unemployment Insurance (UI) benefits to victims of domestic violence is one mechanism for supporting women as they seek to escape the violence in th...
Historically, violence directed against a woman by her husband was considered a private matter. Consequently, police responses had inadequately protected wives from severe injury and even death (Thurman v. City of Torrington, 1984). Police often delayed responding to such calls, or ignored them entirely. Warrentless arrests were only made when the...