{"id":"https://openalex.org/W3118369266","doi":"https://doi.org/10.4018/ijcwt.2021010102","title":"Knowledge Extraction on the Nexus Between Terrorism Criteria and Attacks on Private Citizens and Property","display_name":"Knowledge Extraction on the Nexus Between Terrorism Criteria and Attacks on Private Citizens and Property","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3118369266","doi":"https://doi.org/10.4018/ijcwt.2021010102","mag":"3118369266"},"language":"en","primary_location":{"id":"doi:10.4018/ijcwt.2021010102","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcwt.2021010102","pdf_url":null,"source":{"id":"https://openalex.org/S4210168647","display_name":"International Journal of Cyber Warfare and Terrorism","issn_l":"1947-3435","issn":["1947-3435","1947-3443"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cyber Warfare and Terrorism","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023274520","display_name":"Donald Douglas Atsa\u2019am","orcid":"https://orcid.org/0000-0001-9687-8042"},"institutions":[{"id":"https://openalex.org/I26999989","display_name":"University of the Free State","ror":"https://ror.org/009xwd568","country_code":"ZA","type":"education","lineage":["https://openalex.org/I26999989"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Donald Douglas Atsa'am","raw_affiliation_strings":["University of the Free State, South Africa"],"raw_orcid":"https://orcid.org/0000-0001-9687-8042","affiliations":[{"raw_affiliation_string":"University of the Free State, South Africa","institution_ids":["https://openalex.org/I26999989"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077662377","display_name":"Ruth Wario","orcid":"https://orcid.org/0000-0003-3733-3485"},"institutions":[{"id":"https://openalex.org/I26999989","display_name":"University of the Free State","ror":"https://ror.org/009xwd568","country_code":"ZA","type":"education","lineage":["https://openalex.org/I26999989"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Ruth Wario","raw_affiliation_strings":["University of the Free State, South Africa"],"raw_orcid":"https://orcid.org/0000-0003-3733-3485","affiliations":[{"raw_affiliation_string":"University of the Free State, South Africa","institution_ids":["https://openalex.org/I26999989"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5023274520"],"corresponding_institution_ids":["https://openalex.org/I26999989"],"apc_list":null,"apc_paid":null,"fwci":1.139,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.83044044,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"11","issue":"1","first_page":"20","last_page":"30"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10994","display_name":"Terrorism, Counterterrorism, and Political Violence","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10994","display_name":"Terrorism, Counterterrorism, and Political Violence","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.900600016117096,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/terrorism","display_name":"Terrorism","score":0.8789811134338379},{"id":"https://openalex.org/keywords/nexus","display_name":"Nexus (standard)","score":0.6949700117111206},{"id":"https://openalex.org/keywords/action","display_name":"Action (physics)","score":0.5875028967857361},{"id":"https://openalex.org/keywords/property","display_name":"Property (philosophy)","score":0.5471351742744446},{"id":"https://openalex.org/keywords/politics","display_name":"Politics","score":0.511886477470398},{"id":"https://openalex.org/keywords/private-property","display_name":"Private property","score":0.4801304042339325},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.44971218705177307},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.41845762729644775},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.38027340173721313},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3442208170890808},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.2717013657093048},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.16616234183311462},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.10764971375465393}],"concepts":[{"id":"https://openalex.org/C203133693","wikidata":"https://www.wikidata.org/wiki/Q7283","display_name":"Terrorism","level":2,"score":0.8789811134338379},{"id":"https://openalex.org/C148609458","wikidata":"https://www.wikidata.org/wiki/Q7021281","display_name":"Nexus (standard)","level":2,"score":0.6949700117111206},{"id":"https://openalex.org/C2780791683","wikidata":"https://www.wikidata.org/wiki/Q846785","display_name":"Action (physics)","level":2,"score":0.5875028967857361},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.5471351742744446},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.511886477470398},{"id":"https://openalex.org/C2777538416","wikidata":"https://www.wikidata.org/wiki/Q555911","display_name":"Private property","level":2,"score":0.4801304042339325},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.44971218705177307},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.41845762729644775},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.38027340173721313},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3442208170890808},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.2717013657093048},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.16616234183311462},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.10764971375465393},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4018/ijcwt.2021010102","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcwt.2021010102","pdf_url":null,"source":{"id":"https://openalex.org/S4210168647","display_name":"International Journal of Cyber Warfare and Terrorism","issn_l":"1947-3435","issn":["1947-3435","1947-3443"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cyber Warfare and Terrorism","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7699999809265137,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W92486268","https://openalex.org/W1974618278","https://openalex.org/W2007929615","https://openalex.org/W2088022964","https://openalex.org/W2103647733","https://openalex.org/W2420451745","https://openalex.org/W2560978178","https://openalex.org/W2920830346","https://openalex.org/W2925288571","https://openalex.org/W2940418775","https://openalex.org/W2969655854","https://openalex.org/W2988489243","https://openalex.org/W3033462832"],"related_works":["https://openalex.org/W3126909309","https://openalex.org/W4256360871","https://openalex.org/W2747100754","https://openalex.org/W3117832639","https://openalex.org/W2965101536","https://openalex.org/W2891178753","https://openalex.org/W3121214617","https://openalex.org/W2081877044","https://openalex.org/W4241565762","https://openalex.org/W2968322125"],"abstract_inverted_index":{"This":[0],"study":[1],"extracted":[2],"knowledge":[3],"on":[4,93,118,130],"the":[5,14,34,51,56,68,88,94,108,162],"association":[6],"between":[7,110],"terrorism":[8,15,96],"inclusion":[9],"criteria":[10,25,114],"and":[11,22,86,115,121,133],"one":[12],"of":[13,99,102,112,161],"target/victim":[16],"types":[17],"known":[18],"as":[19],"\u201cprivate":[20],"citizens":[21,120,132],"property.\u201d":[23],"Three":[24],"determine":[26],"what":[27],"constitutes":[28],"a":[29,42,145],"terror":[30,77,116,128,146],"attack:":[31],"Criterion":[32,49,66,80,152,157],"1:":[33],"action":[35,52,69],"is":[36,53,70,135],"done":[37,54],"with":[38,55],"intention":[39,57],"to":[40,58,63,106,140,150,155],"attain":[41],"political,":[43],"economic,":[44],"religious,":[45],"or":[46,61],"social":[47],"goal;":[48],"2:":[50],"coerce,":[59],"intimidate":[60],"publicize":[62],"larger":[64],"audience(s);":[65],"3:":[67],"outside":[71],"international":[72],"humanitarian":[73],"law.":[74],"Literally,":[75],"all":[76],"incidents":[78],"satify":[79],"3.":[81],"As":[82],"for":[83],"Criteria":[84],"1":[85],"2,":[87],"odds":[89],"ratio":[90],"was":[91],"deployed":[92],"global":[95],"database,":[97],"consisting":[98],"170,350":[100],"records":[101],"terrorist":[103],"attack":[104,129],"incidents,":[105],"evaluate":[107],"nexus":[109],"each":[111],"these":[113],"attacks":[117],"private":[119,131],"property.":[122],"The":[123,159],"results":[124],"showed":[125],"that":[126],"any":[127],"property":[134],"2.2":[136],"times":[137],"more":[138],"likely":[139],"have":[141],"been":[142],"perpetrated":[143],"by":[144],"group":[147],"in":[148,164],"order":[149],"achieve":[151,156],"2":[153],"than":[154],"1.":[158],"implications":[160],"outcome":[163],"counterterrorism":[165],"are":[166],"discussed.":[167]},"counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
