How Terrorism Spreads Emulation and The Diffusion of Ethnic and Ethnoreligious Terrorism
How Terrorism Spreads Emulation and The Diffusion of Ethnic and Ethnoreligious Terrorism
and Ethnoreligious
Terrorism
Sara M. T. Polo1
Abstract
Previous research on the causes of domestic terrorism has tended to focus on
domestic determinants. Although this approach can be helpful to understand many
causes of terrorism, it implicitly disregards how the tactical choices made by similar
nonstate actors elsewhere influence a group’s decision to resort to terrorist tactics.
This study argues that the adoption of terrorism among ethnic and ethnoreligious
groups results from a process of conditional emulation. Groups are more likely to
emulate the terrorist choice of others with whom they are connected by shared
political grievances and spatial networks. The theory is tested on a new and original
group-level data set of ethnic and ethnoreligious terrorism (1970 to 2009) using
geospatial analysis and spatial econometric models. The results provide strong
support for the hypothesized mechanism leading to the diffusion of terrorism and
suggest that emulation—more than domestic and contextual factors—substantially
influences dissidents’ tactic choice.
Keywords
terrorism, tactics, diffusion, emulation, spatial econometrics
1
Department of Government, University of Essex, Colchester, United Kingdom
Corresponding Author:
Sara M. T. Polo, Department of Government, University of Essex, Wivenhoe Park, Colchester CO4 3SQ,
United Kingdom.
Email: [email protected]
Polo 1917
Recent terrorist attacks in Paris (2015) and Brussels (2016), carried out by returning
fighters from the war in Syria, have sparked fears of a spread of terrorism. Those
attacks showed how disenfranchised individuals could get inspired by the terrorist
activities of similar groups elsewhere, travel to conflict zones, receive training in
terrorist tactics, and conduct major attacks upon their return home (Schmidt 2016).
Indeed, terrorism has become an increasingly popular tactic among dissident groups.
Terrorist attacks have surged, globally, from an average of 1,523 attacks in the 1970s
to over 13,000 attacks in 2016 (Global Terrorism Database [GTD]). Moreover,
ethnic and ethnoreligious terrorism has become the most common: in 2016, four
of the five most active terrorist organizations were linked to ethnic and ethnoreli-
gious groups (i.e., Pashtun, Iraqi Sunni, Zaydi, and Kurds) killing an estimated 7,283
civilians. Despite the growing popularity of terrorism, however, not all groups
engage in this tactic. The tactical choices of the above groups stand in contrast with
those of other ethnic groups fighting conflicts in Chad, Myanmar, Liberia, and
Ethiopia, who largely avoided resorting to terrorism. Why has terrorism become a
dominant tactic among some groups and not others? To what extent are the Paris and
Brussels attacks illustrative of a broader phenomenon, whereby a group’s choice to
adopt (or reject) terrorism is influenced by the tactical choices of similar groups
elsewhere?
Despite a wealth of research on the causes of terrorism, existing work has not yet
adequately addressed the choice of terrorism by specific subnational groups and
organizations. Quantitative studies of domestic terrorism1 typically focus on the
attributes of states where terrorism emerges. Yet, this approach does not explain
why countries that are similar in many aspects (e.g., regime type, institutions, eco-
nomic wealth, instability) experience very different levels of terrorism by ethnic and
ethnoreligious groups, or why such terrorism has become so widespread. While it
may be tempting to explain domestic terrorism based solely on attributes of the
domestic context, this approach is incomplete as it disregards strategic interdepen-
dence in nonstate actors’ decision-making; that is, how the tactical choices by one
group affect the choices of other groups elsewhere. To date, only a handful of studies
have examined the diffusion of terrorism, but focusing only on transnational terror-
ism and on the country-level incidence of attacks (e.g., Braithwaite and Li 2007;
Neumayer and Plümper 2010). Domestic terrorism, however, is not a countrywide
phenomenon but typically emerges from specific subnational communities (Nemeth,
Mauslein, and Stapley 2014). Thus, we still know little about why terrorism is
chosen by some substate groups and not others and under what conditions domestic
groups respond to external incentives and “copy” the terrorist choice of others.
This article aims to fill this gap. I present a novel argument focusing on domestic
terrorism as the product of a diffusion process whereby groups observe and emulate
the tactical choice of others whom they perceive as similar to them and as an
example for their own behavior. The tactical choices and experiences of similar
ethnic groups are perceived to (and in fact may) contain relevant information on
the appropriateness of a tactical innovation in a specific political context (Simmons
1918 Journal of Conflict Resolution 64(10)
and Elkins 2004). Terrorist choices are therefore, in some sense, interdependent. But
terrorism does not spread everywhere and observing other groups’ terrorism does not
automatically lead to adoption. Political similarity between groups, especially
shared political marginalization, facilitates mutual identification and creates a feel-
ing of common grievances. This makes a group more willing to emulate the terrorist
choice of similar groups elsewhere. Yet, for successful emulation to occur, groups
also need to be capable to adopt terrorism. Geographic or network proximity to
groups who already engage in terrorism lowers the resource and skills constraints for
the adoption of terrorist tactics, provides logistical advantages for their use, and
increases a group’s overall perception of (terrorist) efficacy. Together, shared grie-
vances and direct ties between potential adopters and transmitters determine the
optimal conditions for the emulation of terrorism.
Group-level analyses of terrorism and diffusion have so far been hampered by the
lack of available data. In this article, I introduce a new and original data set of ethnic
and ethnoreligious terrorism, linking organizations in the GTD to ethnic groups in
the Ethnic Power Relations (EPR) database (Cederman, Min, and Wimmer 2010).
This is the first actor-based global data set on the use of terrorist tactics which
identifies the specific subnational ethnic communities from which terrorist organi-
zations have emerged. Using geospatial data on the geographic distance between
ethnic group settlements and nonspatial data on groups’ political status, I generate
measures of connectivity between all politically relevant ethnic groups between
1970 and 2009 based on their degree of political similarity and spatial proximity.
I then examine the effect of previous adoption of terrorism by an ethnic group on the
likelihood that other connected ethnic groups in the same and other countries resort
to terrorism and find a strong positive effect. Results from a Bayesian spatial probit
further suggest that indirect effects, or spatial feedbacks, reflecting tactical diffusion
are often more important than the direct effect of domestic attributes for explaining
the adoption of terrorist tactics. Moreover, while spatial proximity alone is insuffi-
cient to account for diffusion and operates in conjunction with identification via
shared grievances, some degree of proximity to “transmitters” gives organizations a
competitive advantage for the adoption of terrorist tactics relative to purely nonrela-
tional mechanisms based on media effects. The findings are robust across different
model specifications and estimations, when taking into account alternative diffusion
mechanisms such as spillover or competition, and while controlling for a number of
exogenous external conditions and spatially clustered group-level factors as well as
common shocks, which increase confidence that the results are not driven by a
simple common exposure.
This study contributes to research on terrorism, diffusion, and ethnic conflicts in
several important ways. By conducting the first systematic group-level analysis of
the diffusion of domestic terrorism, it shows that this very common type of terrorism
is often a product of strategic emulation between groups. This contributes an alter-
native explanation of domestic terrorism focused on the interdependence of groups’
tactical choices.
Polo 1919
Dobbin, and Garrett 2008). Specifically, when deciding whether and how to mobi-
lize collectively, groups often face uncertainty regarding which tactics to use and
which tactics are most appropriate and effective. Even in the presence of political or
economic grievances, ethnic groups can choose, at least in principle, among several
courses of actions. For instance, they can keep the status quo, resort to nonviolent
resistance, or adopt violent tactics. In addition, actors are constrained in their ability
to process information about specific tactics (Tversky and Kahneman 1974). Gath-
ering, elaborating, and evaluating such information can be daunting and groups may
still not be able to determine the appropriateness of a given tactic to their specific
circumstances.
To overcome such uncertainty and constraints on information processing, ethnic
groups often look for examples (Simmons and Elkins 2004). Relying on the expe-
rience of others constitutes a useful cognitive heuristic to resolve the dilemma of
tactic choice. Ethnic group leaders can infer from the prevalence of a particular
tactic within the repertoire of other groups, or by the sheer number of adopters, that
this may be the best thing to do. This process applies also to the choice of terrorist
tactics. When terrorist tactics appear to be gaining attention and attracting partici-
pants, groups may have an incentive to copy that tactic and capitalize on its per-
ceived success (see also Cunningham, Dahl, and Frugé 2018, 594). From a bounded
rationality perspective, emulation of others’ behavior is thus a very simple but useful
focal point for choosing dissent tactics.7
Yet, observing other groups’ adoption of terrorism is a necessary but not suffi-
cient condition for actual emulation. Increasing the availability of information about,
and the visibility of, terrorist tactics only increases the potential audience for such
tactics; it does not necessarily elicit a response from that audience (Hill, Rothchild,
and Cameron 1998). The spread of terrorism can stall in the face of inattention, if
others’ actions do not resonate with the group members, or if a group perceives too
high a risk. The diffusion of terrorism through emulation is not automatic and differs
from the simple spread of ideas. Terrorism is a conflict tactic, subject to specific
incentives and constraints. In particular, not all groups that employ terrorism are
regarded as relevant or compelling examples to emulate. And not always does the
behavior of other groups positively influences a group’s own calculations of benefits
to be gained and opportunities for effective terrorist action. To understand the
conditions under which terrorist emulation actually occurs, it is necessary to con-
sider specific linkages between sender and (potential) receiver groups and how the
senders’ behavior influences recipient groups’ willingness and capability to initiate
and sustain terrorist activities.
To illustrate, consider the case of ethnic groups in Iran. While Iran is located in a so-
called terrorism hot spot, only the Kurds, Baluchis, and Arabs have resorted to
terrorism while the Persians and the Azeri have not. Similarly, in France, only the
Corsicans, Bretons, and Basques have adopted terrorism following the example of
other marginalized groups in Spain, Italy, and United Kingdom, while no organiza-
tion claiming to represent the French has resorted to terrorism.
Exposure to other
groups’ terrorism
political exclusion shared grievances Expected efficacy b/w sender & receiver
Emulation
sharing of similar grievances. As Figure 2 illustrates, this is more likely when both
sender and receiver groups are politically excluded. Second, groups need to be opti-
mistic about the availability of terrorism-specific resources and skills, which boost
their capacity to effectively carry out attacks. This condition is influenced by the
degree of geographic proximity to groups that already adopt terrorist tactics. However,
a generic proximity to terrorism (such as the presence of a terrorism hot spot in the
neighborhood) will be insufficient to spur emulation. Proximity to terrorism operates
in conjunction with identification between groups through shared political exclusion.
In the absence of the latter, groups will be less likely to collectively emulate terrorist
violence despite the available opportunities.9 To illustrate, consider the case of the
indigenous groups of South America (e.g., Quechua, Indigenous People of the Ama-
zon, Aymara, Tupi-Guarani). This region experienced several civil wars and some of
the highest levels of terrorism ever recorded, mainly inspired by leftist ideologies. Yet,
marginalized indigenous groups did not respond positively to such violence and no
organization claiming to represent these groups has resorted to terrorism. Instead,
nonviolent tactics have rapidly spread among these groups to become one of their
primary methods of resistance (Cunningham and Sawyer 2017).
Based on the above discussion, I formulate the following hypothesis:
EPR data set (EPR-ETH; Cederman, Min, and Wimmer 2010). To link terrorist
organizations with corresponding ethnic groups, I collected information on whether
organizations claim to represent a specific ethnic group, complementing the infor-
mation in the Armed Conflict to EPR data set (Wucherpfennig et al. 2012) with
additional research on organizations not involved in a civil war.10 This data set
allows me to identify the specific ethnic and ethnoreligious communities from which
terrorist organizations have emerged.
The dependent variable is a group-level binary indicator of terrorism, based on
one or more attacks perpetrated by organizations linked to an ethnic group per
year.11 Only domestic terrorist attacks are considered, and I exclude attacks perpe-
trated by ethnic organizations in other countries.
To estimate terrorist diffusion between groups, I rely on spatial regression models
where a connectivity matrix W specifies the dependence structure between all
politically relevant ethnic groups in every given year. I generate two sets of spatial
weights matrices that reflect the two different forms of connectivity presented in the
theory, namely, similarity based on shared political grievances and degree of spatial
proximity. To operationalize shared political grievances, I consider whether two
groups share a status of political exclusion. The EPR coding of political exclusion
focuses on exclusion from access to central government. Based on the political status
of each ethnic group for every given year, I construct a binary matrix of political
similarity where elements are 1 if two groups share political exclusion and 0 other-
wise. I measure geographic proximity between ethnic groups using GeoEPR, a geo-
referenced version of the EPR-ETH data set, which encompasses information on the
specific settlement areas (polygons) of ethnic groups from 1946 to 2009. GeoEPR
includes 812 group polygons and over 700 unique ethnic groups. Group polygons are
not fixed but can change over time reflecting the emergence of new countries or
changing settlements within countries. For each year from 1970 to 2009, I calculate
the minimum distance between each group polygon and all other polygons and
generate a binary connectivity matrix for each year.12
For each year, the two matrices are multiplied element by element (i.e., Hada-
mard product) so that each element (or weight) wijt of the final matrix represents the
product of elements wijt of the original two matrices. This interaction produces a
matrix, WExclusionProximity , which reflects the specific combination of shared polit-
ical grievances and geographic proximity which is posited in the theoretical argu-
ment (nonspatial and spatial weights). The matrices are then combined into a single
NT NT block diagonal matrix.13
To test the hypothesis that ethnic groups are more likely to adopt terrorism when
similarly excluded groups in the region also adopt terrorism, I rely on a two-pronged
research design focusing on multilevel and spatial econometric models. First, given
the clustered nature of the data, with group-years nested in groups nested in coun-
tries, I employ a series of multilevel spatial logit models in which the intercepts vary
as a function of clustered group- and country-level variables. These models account
1928 Journal of Conflict Resolution 64(10)
for different forms of spatial dependence between observations and for the variance
among groups’ in terms of their susceptibility to adopting terrorism (i.e., unit het-
erogeneity). Empirically, this is modeled by including a spatial lag and by allowing
the group intercepts to vary according to specific group-level attributes conducive to
terrorism.
In the multilevel models, the spatial lag is obtained as the product of the weights
matrix WExclusionProximity , as previously defined, and a temporally lagged dependent
variable (yt1 ).14 In the models, I rely on two different observational spatial lags.
The main difference between them is given by the measure of geographic proximity
adopted in the construction of the W matrix. In the first case, the spatial lag is
calculated considering as neighbors all politically similar (i.e., excluded) ethnic
groups within a minimum distance of 200 km. In the second case, only the politically
similar groups in first-order neighbor countries are considered; hence, I exclude
from the neighbors’ list all groups within the same country. This is because the
observed diffusion effects could be due not only to emulation between groups but
also to the alternative mechanism of competition. However, if this mechanism is
indeed at work, it should only affect ethnic groups fighting against the same gov-
ernment and possibly sharing similar audiences. The two observational spatial lags
also differ in that the one which only considers ethnic groups in neighboring coun-
tries takes the form of a dummy variable measuring whether at least one group in the
neighborhood has adopted terrorist tactics in the previous year (rather than their
weighted average or sum).
The multilevel model described above provides an important first test of
terrorist diffusion. However, it does not allow to fully estimate the strength of
interdependence between groups’ tactical choices and how spatial effects pro-
pagate through the groups in the system (see also Franzese, Hays, and Cook
2016). Therefore, to provide a more complete analysis of terrorism diffusion that
incorporates these important aspects, I rely on a more sophisticated spatial
probit model, estimated by Bayesian Markov Chain Monte Carlo (MCMC;
Wilhelm and Godinho de Matos 2013; LeSage and Pace 2009) on a subset of
the data set.
The estimation of a spatial probit model represents a more complex approach.
Suppose we have the following spatial autoregressive model:15
where ðIn rWÞ1 E is the reduced-form error term, and where the errors are no
longer independent and identically distributed due to the spatial multiplier
ðIn rWÞ1 . The jointly determined error terms represent a considerable estimation
challenge due to the need to compute an n-dimensional integral which becomes
analytically intractable even for relatively small n (see also Franzese, Hays, and
Cook 2016).
The Bayesian MCMC approach is a simulation-based method. The basic idea in
Bayesian estimation is to sample from the posterior distribution of the model para-
meters pðy ; b; rjyÞ given the data and some prior distributions for the parameters.
The sampling from the posterior distribution can be realized by an MCMC and
Gibbs sampling scheme (Wilhelm and Godinho de Matos 2013).
The Bayesian estimator of the spatial probit introduced by Wilhelm and Godinho
de Matos (2013) follows the Bayesian Gibbs sampling approach proposed by
LeSage (2013) and LeSage and Pace (2009) with some modifications to facilitate
implementation. For computational efficiency, the spatial probit is estimated on a
subset of the main data set, that is, two cross sections of all ethnic groups from 1991
to 1999 and from 2000 to 2009, where values of the dependent variable are averaged
over each time period. To avoid posttreatment bias, the average values of the group-
level covariates are calculated using only the years up to the first observed terrorist
attack for each ethnic group. An additional step would be to estimate the models
considering values of the dependent and independent variables in each year. The size
of data set, which has more than 22,000 observations, makes it very computationally
intensive to estimate a Bayesian spatial probit over the full data set.
In both the multilevel and spatial probit models, I consider a number of additional
influences on groups’ incentives for terrorism. In particular, I control for the non-
spatial effect of political exclusion, that is, the effect of political exclusion in the
absence of diffusion (i.e., predynamic effects; Franzese, Hays, and Cook 2016).
While the theory posits that political grievances are more likely to lead to terrorism
when they are activated by the terrorist choices of similar groups elsewhere, it is
important to test whether exclusion by itself is sufficient to induce terrorism. There-
fore, all models include dummy variables for the political status of ethnic groups
which reflect the type and degree of political exclusion, with included groups as
reference category. I also control for the relative size of the ethnic group, to account
for latent mobilization potential. Data on political status and group size are taken
from the EPR-ETH data set. Even though the analysis is at the group-level, con-
textual factor may still affect groups’ choice of terrorism. I therefore control for a
country’s level of democracy (Vreeland 2005) and its gross domestic product per
capita (Gleditsch 2002). In addition, since civil war is frequently associated with
higher levels of domestic terrorism (Findley and Young 2012; Smith and Zeigler
1930 Journal of Conflict Resolution 64(10)
Table 1. Probability of Terrorism for Ethnic Groups (Full Sample 1970 to 2009).
Note: Cubic polynomials are not shown in the table. GDP ¼ gross domestic product.
*p < .05.
**p < .01.
***p < .001.
2017), I include a variable for the presence of civil war to account for possible
domestic spillover effect. Civil war data are culled from the Uppsala Conflict Data
Program using a threshold of twenty-five battle-related deaths. Finally, I include a
cubic polynomial of time since the last terrorist attack to control for temporal
dependence (Carter and Signorino 2010).16
Table 2. MCMC Spatial Autoregressive Probit (20,000 Iterations, Burn-in ¼ 2,000, Diffuse
Priors for b Parameters and Uniform Prior for r).
A B
0.100
0.075
Probability of terrorism
Probability of terrorism
0.075
●
0.050
0.050
0.025
0.025
●
0.000
0.000
No Terrorism Terrorism 0.00 0.25 0.50 0.75 1.00
Table 3. Average Direct, Indirect, and Total Effects from Spatial Probit 1991 to 1999 and
2000 to 2009 (95 Percent Credible Intervals).
Figure 4. Spatial effects. (A) Spatial diffusion of the probability of terrorism following a shock
to the political status of the Kurds (Turkey) toward discrimination (model predictions 1991 to
1999). (B) Ethnic groups that actually adopted terrorist tactics between 1991 and 1999 in the
same region (for comparison with the model predictions).
Figure 5. Spatial diffusion of the probability of terrorism following a shock to the political
status of the Sunni (Iraq) toward discrimination (model predictions 2000 to 2009).
Conclusion
This article shows the importance of considering interdependence between terrorist
organizations and strategic emulation as a crucial mechanism leading to the adoption
of terrorist tactics. Despite a burgeoning literature on the causes of domestic terror-
ism, the vast majority of existing studies regards terrorist organizations as indepen-
dent of each other and the adoption of terrorist tactics as a purely “domestic”
decision, rooted in country-specific or individual-level attributes. Common accounts
of domestic terrorism, based on grievances and/or opportunities for violent mobili-
zation, have mainly assumed these to be domestically determined. This study
focuses instead on how the behavior of other groups can make group grievances
politically salient and shape a group’s perceptions of efficacy by mitigating the
resource, skills, and logistical constraints on the adoption of terrorist tactics. Rather
than simply testing for interdependence of terrorist activities between ethnic groups,
I introduce a specific mechanism of diffusion, based on emulation. Such emulation
is conditional on mutual identification based on shared grievances and on percep-
tions of terrorist efficacy. These are more likely to occur when sender and receiver
groups share a status of political exclusion and are geographically proximate. All
models provide strong support for the theoretical argument based on diffusion and
for the specified conditions under which terrorist emulation is more likely to occur.
The new data set introduced in this study has allowed to identify the specific
ethnic and ethnoreligious communities from which terrorist organizations could
emerge and to provide the first quantitative evidence for the diffusion of domestic
terrorism through emulation. At this point, it is difficult to study explicitly religious
terrorism because of the lack of cross-national data on the religious affiliations of
terrorist organizations and on societal groups other than politically relevant ethnic
groups. At the same time, this study, and its mechanism of diffusion, have important
implications also for the recent phenomenon of Jihadist radicalization in Western
Europe. A recent study by the Combating Terrorism Center at West Point—which
analyzed the profiles of nearly 2,000 European jihadist foreign fighters who traveled
to Iraq and Syria—highlights that “despite the growing attention to the role of virtual
recruitment, the majority of foreign fighters still relied on some form of interperso-
nal connection to make the decision to leave their home country and join the jihadi
movement” (Perliger and Milton 2016, 26-27). The study adds that “while virtual
propaganda can provide the initial cognitive opening for adopting the jihadi narra-
tive, a human connection is necessary to push the individual to actual activism, as
well as for logistical reasons for traveling to a war zone” (p. 31). Interestingly, while
1938 Journal of Conflict Resolution 64(10)
Author’s Note
The data and code to reproduce the empirical results can be found on the Journal of Conflict
Resolution website http://jcr.sagepub.com/.
Acknowledgments
I am deeply grateful to Victor Asal, Navin Bapat, Jessica Maves Braithwaite, Chad Clay, Xun
Cao, Songying Fang, Federica Genovese, Kristian Gleditsch, Imke Harbers, Ryan Kennedy,
Ashley Leeds, Quan Li, Cliff Morgan, David Siegel, Hugh Ward, and the anonymous
reviewers for their helpful comments and suggestions and also grateful for support from the
Economic and Social Research Council (grant number ES/J500045/1).
Funding
The author(s) disclosed receipt of the following financial support for the research, authorship,
and/or publication of this article: This work was supported by Economic and Social Research
Council (grant number ES/J500045/1).
ORCID iD
Sara M. T. Polo https://orcid.org/0000-0002-4965-6022
Supplemental Material
Supplemental material for this article is available online.
Polo 1939
Notes
1. Domestic terrorism constitutes the vast majority of global terrorism. It is homegrown in
that the venue, main target, and perpetrators all belong to the same country. Transnational
terrorism involves more than a single country, either through its victims, targets, or
perpetrators (Enders and Sandler 2012). A complete definition of terrorism is provided
in the next section.
2. The French Basques and Corsicans both started in the late 1970s, the Baloch in the mid-
2000s, and the Kurds in the 1980s.
3. For an excellent discussion of differences between domestic and transnational terrorism,
see Enders, Sandler, and Gaibulloev (2011).
4. Research on civil war contagion has also focused primarily on linkages between countries
(e.g., Buhaug and Gleditsch 2008; Maves and Braithwaite 2013; Metternich, Minhas, and
Ward 2017).
5. Organizations with a religious ideology that do not make ethnic claims (e.g., al-Qaida in
the Islamic Maghreb, al-Shabaab) fall outside the scope conditions of this study.
6. The theoretical argument seeks to explain the group-level, organizational decision to
adopt terrorism rather than the choices of isolated individuals. Therefore, the so-called
lone wolf attacks are outside the scope of the theory.
7. This process applies not only to the choice of terrorism but also to specific terrorist tactics
such as bombings and suicide attacks.
8. Focusing on the case of refugees, Schmidt (2016) highlights that radicalization to violent
extremism and recruitment into terrorist groups becomes more likely where refugee
camps are in direct contact with fighters from an ongoing conflict (emphasis added).
9. This is an important departure from Tobler’s First Law of Geography, according to which
“everything is related to everything else but near things are more related than distant
things.” In other words, not all terrorist choices are related; mutual identification between
politically excluded groups plays a central role in terrorist diffusion processes.
10. For additional details on the coding rules and the data set, see Online Appendix C.
11. In Online Appendix A, I discuss the appropriateness, in this study, of binary measures of
terrorism versus attack counts.
12. I have used two different thresholds to define neighbors (see below).
13. The results are not affected by whether or not the matrix is row-standardized, see Online
Appendix A.
14. The dependent variable is temporally lagged to avoid simultaneity bias.
15. For identification, s2E is set to s2E ¼ 1 for probit.
16. In the spatial probit, which is cross-sectional, I control for a group’s history of terrorism
(Online Appendix B).
17. Online Appendix B describes all the convergence diagnostics performed.
18. The calculation of these spatial effects is particularly intensive. See Online Appendix B
for further details.
19. See Online Appendix B. Unfortunately, it is not possible to estimate these effects for all
groups simultaneously because this would require evaluating an n-dimensional integral.
1940 Journal of Conflict Resolution 64(10)
20. I also control for terrorism diffusion through transborder kinship ties. Substantive con-
clusions remain unchanged.
References
Asal, Victor, Mitchell Brown, and Marcus Schulzke. 2015. ““Kill Them All-Old and Young,
Girls and Women and Little Children”: An Examination of the Organizational Choice of
Targeting Civilians.” Political Science Research and Methods 3 (03): 589-607.
Asal, Victor H., Hyun Hee Park, R. Karl Rethemeyer, and Gary Ackerman. 2016. “With
Friends Like These . . . Why Terrorist Organizations Ally.” International Public Manage-
ment Journal 19 (1): 1-30.
Asal, Victor, and Karl R. Rethemeyer. 2008. “The Nature of the Beast: Organizational
Structures and the Lethality of Terrorist Attacks.” The Journal of Politics 70 (2): 437-49.
Bapat, Navin A., and Sean Zeigler. 2016. “Terrorism, Dynamic Commitment Problems, and
Military Conflict.” American Journal of Political Science 60 (2): 337-51.
Bove, Vincenzo, and Tobias Böhmelt. 2016. “Does Immigration Induce Terrorism?” The
Journal of Politics 78 (2): 572-88.
Braithwaite, Alex, and Tiffany S. Chu. 2018. “Civil Conflicts Abroad, Foreign Fighters, and
Terrorism at Home.” Journal of Conflict Resolution 62 (8): 1636-60.
Braithwaite, Alex, and Quan Li. 2007. “Transnational Terrorism Hot-spots: Identification and
Impact Evaluation.” Conflict Management and Peace Science 24 (4): 281-96.
Bueno de Mesquita, Ethan, and Eric S. Dickson. 2007. “The Propaganda of the Deed: Terror-
ism, Counterterrorism, and Mobilization.” American Journal of Political Science 51 (2):
365-81.
Buhaug, Halvard, and Kristian Skrede Gleditsch. 2008. “Contagion or Confusion? Why
Conflicts Cluster in Space.” International Studies Quarterly 52 (2): 215-33.
Carter, David B., and Curtis S. Signorino. 2010. “Back to the Future: Modeling Time
Dependence in Binary Data.” Political Analysis 18 (3): 271-92.
Cederman, Lars-Erik, Kristian Skrede Gleditsch, and Halvard Buhaug. 2013. Inequality,
Grievances, and Civil War. New York: Cambridge University Press.
Cederman, Lars-Erik, Brian Min, and Andreas Wimmer. 2010. “Why Do Ethnic Groups
Rebel? New Data and Analysis.” World Politics 62 (1): 87-119.
Checkel, Jeffrey T., ed. 2013. Transnational Dynamics of Civil War. Cambridge, UK:
Cambridge University Press.
Choi, Seung-Whan, and James A. Piazza. 2014. “Ethnic Groups, Political Exclusion and
Domestic Terrorism.” Defence and Peace Economics 27 (1): 37-63.
Cunningham, Kathleen, Marianne Dahl, and Anne Frugé. 2018. “Strategies of Resistance:
Diversification and Diffusion.” American Journal of Political Science 61 (3): 591-605.
Cunningham, Kathleen Gallagher, and Katherine Sawyer. 2017. “Is Self-determination Con-
tagious? A Spatial Analysis of the Spread of Self-determination Claims.” International
Organization 71 (3): 585-604.
Enders, Walter, and Todd Sandler. 2012. The Political Economy of Terrorism. Cambridge,
MA: Cambridge University Press.
Polo 1941
Enders, Walter, Todd Sandler, and Kusrav Gaibulloev. 2011. “Domestic versus Transnational
Terrorism: Data, Decomposition, and Dynamics.” Journal of Peace Research 48 (3):
319-37.
Findley, Michael G., and Joseph K. Young. 2011. “Terrorism, Democracy, and Credible
Commitments.” International Studies Quarterly 55 (1): 1-22.
Findley, Michael G., and Joseph K. Young. 2012. “Terrorism and Civil War: A Spatial and
Temporal Approach to a Conceptual Problem.” Perspectives on Politics 10 (2): 285-305.
Franzese, Robert J. Jr., Jude C. Hays, and Scott J. Cook. 2016. “Spatial and Spatio-temporal
Autoregressive Probit Models of Interdependent Binary Outcomes.” Political Science
Research and Methods 4 (1): 151-73.
Galton, Francis. 1889. “Comment on Edward B. Tylor’s ‘On a Method of Investigating the
Development of Institutions, Applied to Laws of Marriage and Descent’.” Journal of the
Royal Anthropological Institute 18 (3): 245-69.
Gleditsch, Kristian Skrede. 2002. “Expanded Trade and GDP Data, 1946-99.” Journal of
Conflict Resolution 46 (5): 712-24.
Hill, Stuart, Donal Rothchild, and Colin Cameron. 1998. “Tactical Information and The
Diffusion of Peaceful Protests.” In The International Spread of Ethnic Conflict: Fear,
Diffusion, and Escalation, edited by David Lake and Donald Rothchild, 61-88. Princeton,
NJ: Princeton University Press.
Horowitz, Michael C. 2010. “Nonstate Actors and the Diffusion of Innovations: The Case of
Suicide Terrorism.” International Organization 64 (1): 33-64.
Krueger, Alan. 2007. What Makes a Terrorist: Economics and the Roots of Terrorism. Prin-
ceton, NJ: Princeton University Press.
Kuran, Timur. 1998. “Ethnic Dissimilation and its International Diffusion.” In The Interna-
tional Spread of Ethnic Conflict: Fear, Diffusion, and Escalation, edited by David Lake
and Donald Rothchild, 35-60. Princeton, NJ: Princeton University Press.
Lake, David A., and Donald Rothchild. 1998. The International Spread of Ethnic Conflict:
Fear, Diffusion, and Escalation. Princeton, NJ: Princeton University Press.
LeSage, James P. 2013. “Bayesian Estimation of Limited Dependent Variable Spatial Auto-
regressive Models.” Geographical Analysis 31 (1): 19-35.
LeSage, James P., and R. Kelley Pace. 2009. Introduction to Spatial Econometrics. Boca
Raton, FL: CRC Press/Taylor and Francis.
Maves, Jessica, and Alex Braithwaite. 2013. “Autocratic Institutions and Civil Conflict Con-
tagion.” The Journal of Politics 75 (2): 478-90.
Metternich, Nils W., Shahryar Minhas, and Michael D. Ward. 2017. “Firewall? or Wall on
Fire? A Unified Framework of Conflict Contagion and the Role of Ethnic Exclusion.”
Journal of Conflict Resolution 61 (6): 1151-73.
Midlarsky, Manus, Martha Crenshaw, and Fumihiko Yoshida. 1980. “Why Violence Spreads.
The Contagion of International Terrorism.” International Studies Quarterly 24 (2):
262-98.
Nemeth, Stephen C., Jacob A. Mauslein, and Craig Stapley. 2014. “The Primacy of the Local:
Identifying Terrorist Hot Spots Using Geographic Information Systems.” The Journal of
Politics 76 (2): 304-17.
1942 Journal of Conflict Resolution 64(10)
Neumayer, Erik, and Thomas Plümper. 2010. “Galton’s Problem and Contagion in Interna-
tional Terrorism along Civilizational Lines.” Conflict Management and Peace Science 27
(4): 308-25.
Pape, Robert A. 2003. “The Strategic Logic of Suicide Terrorism.” American Political Sci-
ence Review 97 (3): 343-61.
Perliger, Arie, and Daniel Milton. 2016. “From Cradle to Grave: The Lifecycle of Foreign
Fighters in Iraq and Syria.” Report—Combating Terrorism Center at West Point. West
Point, NY: Combating Terrorism Center.
Sageman, Marc. 2004. Understanding Terror Networks. Philadelphia: University of Pennsyl-
vania Press.
Schmidt, Alex P. 2016. “Links between Terrorism and Migration: An Exploration.” Report—
International Centre for Counter-Terrorism, The Hague. The Hague, the Netherlands:
International Centre for Counter-Terrorism.
Shipan, Charles R., and Craig Volden. 2008. “The Mechanisms of Policy Diffusion.”
American Journal of Political Science 52 (4): 840-57.
Simmons, Beth A., Frank A. Dobbin, and Geoffrey Garrett. 2008. The Global Diffusion of
Markets and Democracy. New York: Cambridge University Press.
Simmons, Beth A., and Zachary Elkins. 2004. “The Globalization of Liberalization:
Policy Diffusion in the International Political Economy.” American Political Science
Review 98 (1): 171-89.
Smith, Meagan, and Sean M. Zeigler. 2017. “Terrorism before and after 9/11—A more
Dangerous World?” Research & Politics 4 (4): 1-8.
Tilly, Charles. 1978. From Mobilization to Revolution. New York: McGraw-Hill.
Tilly, Charles. 2003. The Politics of Collective Violence. New York: Cambridge University
Press.
Tversky, Amos, and David Kahneman. 1974. “Judgement under Uncertainty: Heuristics and
Biases.” Science 185 (4157): 1124-31.
Vreeland, James Raymond. 2005. “A Problem with Polity: Unpacking Anocracy.” Typescript,
Department of Political Science, Yale University, New Haven, CT.
Warren, T. Camber. 2014. “Not by the Sword Alone: Soft Power, Mass Media, and the
Production of State Sovereignty.” International Organization 68 (1): 111-41.
Weidmann, Nils B., Suso Benitez-Baleato, Philipp Hunziker, Eduard Glatz, and Xenofontas
Dimitropoulos. 2016. “Digital Discrimination: Political Bias in Internet Service Provision
across Ethnic Groups.” Science 353 (64): 1151-54.
Wilhelm, Stefan, and Miguel Godinho de Matos. 2013. “Estimating Spatial Probit Models
in R.” The R Journal 5 (1): 130-43.
Wucherpfennig, Julian, Nils Metternich, Lars-Erik Cederman, and Kristian Skrede Gleditsch.
2012. “Ethnicity, the State and the Duration of Civil War.” World Politics 64 (1): 79-115.
Wucherpfennig, Julian, Nils B. Weidmann, Luc Girardin, Lars-Erik Cederman, and Andreas
Wimmer. 2011. “Politically Relevant Ethnic Groups across Space and Time: Introducing
the GeoEPR Dataset.” Conflict Management and Peace Science 28 (5): 423-37.