Show simple item record

dc.contributor.authorTownsley, Michaelen_US
dc.contributor.authorD. Johnson, Shaneen_US
dc.contributor.authorH. Ratcliffe, Jerryen_US
dc.date.accessioned2017-05-03T12:54:16Z
dc.date.available2017-05-03T12:54:16Z
dc.date.issued2008en_US
dc.date.modified2010-07-05T04:50:36Z
dc.identifier.issn09551662en_US
dc.identifier.doi10.1057/palgrave.sj.8350090en_AU
dc.identifier.urihttp://hdl.handle.net/10072/22867
dc.description.abstractThis paper describes analyses to determine whether there is a space-time dependency for insurgent activity. The data used for the research were 3 months of terrorist incidents attributed to the insurgency in Iraq during U.S. occupation and the methods used are based on a body of work well established using police recorded crime data. It was found that events clustered in space and time more than would be expected if the events were unrelated, suggesting communication of risk in space and time and potentially informing next event prediction. The analysis represents a first but important step and suggestions for further analysis addressing prevention or suppression of future incidents are briefly discussed.en_US
dc.description.peerreviewedYesen_US
dc.description.publicationstatusYesen_AU
dc.format.extent110357 bytes
dc.format.mimetypeapplication/pdf
dc.languageEnglishen_US
dc.language.isoen_AU
dc.publisherPalgrave Macmillan Ltden_US
dc.publisher.placeUnited Kingdomen_US
dc.publisher.urihttp://www.palgrave-journals.com/sjen_AU
dc.relation.ispartofstudentpublicationNen_AU
dc.relation.ispartofpagefrom139en_US
dc.relation.ispartofpageto146en_US
dc.relation.ispartofissue3en_US
dc.relation.ispartofjournalSecurity Journalen_US
dc.relation.ispartofvolume21en_US
dc.rights.retentionYen_AU
dc.subject.fieldofresearchcode390401en_US
dc.titleSpace time dynamics of insurgent activity in Iraqen_US
dc.typeJournal articleen_US
dc.type.descriptionC1 - Peer Reviewed (HERDC)en_US
dc.type.codeC - Journal Articlesen_US
gro.facultyArts, Education & Law Group, School of Criminology and Criminal Justiceen_US
gro.rights.copyrightCopyright 2008 Palgrave Macmillan. This is a post-peer-review, pre-copyedit version of an article published in Security Journal. The definitive publisher-authenticated version Security Security Journal. 21(3), pp.139-146. United Kingdom: Palgrave Macmillan Ltd] is available online at: http://dx.doi.org/10.1057/palgrave.sj.8350090en_AU
gro.date.issued2008
gro.hasfulltextFull Text


Files in this item

This item appears in the following Collection(s)

  • Journal articles
    Contains articles published by Griffith authors in scholarly journals.

Show simple item record