エラーが発生しました。 詳細 隠す
保存されていないページがあります。 復元 取り消す

Knoema developed this special visualization series to highlight the variety of sources available to track and examine trends in various types of conflict and terrorism-related violence worldwide. Combined with traditional macroeconomic and sociodemographic information and even new indicators for social unrest and transformation, social scientists to security analysts to the average informed citizens now have easier and more reliable access to this valuable data type than ever before. At the bottom of each page, we offer live links to featured and additional conflict datasources. As always, each dataset includes links to the original data source so that you can learn more about the methodology used by sources to collect, verify, and categorize conflict information.

Armed Conflicts | Political ConflictsTerrorist Attacks

Featured conflict data source: The Global Terrorism Database

Definitions:

  • terrorist attack is the threatened or actual use of illegal force and violence by a non-state actor to attain a political, economic, religious, or social goal through fear, coercion, or intimidation. 
  • A bombing/explosion is an attack in which the primary effects are caused by an energetically unstable material undergoing rapid decomposition and releasing a pressure wave that causes physical damage to the surrounding environment.
  • An armed assault is an attack whose primary objective is to cause physical harm or death directly to human beings by use of a firearm, incendiary, or sharp instrument.  
  • An assassination is a act whose primary objective is to kill one or more specific, prominent individuals. 
  • Hostage taking (or, kidnapping) is an act whose primary objective is to take control of hostages for the purpose of achieving a political objective through concessions or through disruption of normal operations.

Emergent Risk Situation Room

Interested in a global business intelligence subscription that includes datasets, visualization tools, and real-time information for assessing risk? Check out the Emergent Risk Situation Room from our partners at ERI.

最終更新: 

このページを削除してもよろしいですか? 

このドキュメントを削除してもよろしいですか? 

次の場所に参照しているショートカットがあるため、ページを削除できません:

    最初にこれらのショートカットを削除してから、ページ自体を削除してください。

    当社の個人情報保護方針&クッキーポリシー

    当社のウェブサイトではクッキーを使用し、ユーザー様のオンライン体験を向上させております。このウェブサイトを立ち上げたときに、クッキーはお使いのコンピュータ上に配置されます。インターネットブラウザの設定を通して、個人的なクッキーの設定を変更できます。

    個人情報保護方針