{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T12:05:08Z","timestamp":1772971508267,"version":"3.50.1"},"reference-count":40,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2021,6,30]],"date-time":"2021-06-30T00:00:00Z","timestamp":1625011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Games"],"abstract":"<jats:p>There are many competing game-theoretic analyses of terrorism. Most of these models suggest nonlinear relationships between terror attacks and some variable of interest. However, to date, there have been very few attempts to empirically sift between competing models of terrorism or identify nonlinear patterns. We suggest that machine learning can be an effective way of undertaking both. This feature can help build more salient game-theoretic models to help us understand and prevent terrorism.<\/jats:p>","DOI":"10.3390\/g12030054","type":"journal-article","created":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T05:00:10Z","timestamp":1625115610000},"page":"54","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Validating Game-Theoretic Models of Terrorism: Insights from Machine Learning"],"prefix":"10.3390","volume":"12","author":[{"given":"James T.","family":"Bang","sequence":"first","affiliation":[{"name":"Department of Economics, St. Ambrose University, Davenport, IA 52803, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8094-2388","authenticated-orcid":false,"given":"Atin","family":"Basuchoudhary","sequence":"additional","affiliation":[{"name":"Department of Economics and Business, Virginia Military Institute, Lexington, VA 24450, USA"}]},{"given":"Aniruddha","family":"Mitra","sequence":"additional","affiliation":[{"name":"Economics Program, Bard College, Annandale-On-Hudson, NY 12504, USA"}]}],"member":"1968","published-online":{"date-parts":[[2021,6,30]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"775","DOI":"10.1016\/S1574-0013(06)02025-4","article-title":"Terrorism: A game-theoretic approach","volume":"2","author":"Sandler","year":"2007","journal-title":"Handb. Def. Econ."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1080\/00031305.2016.1154108","article-title":"The ASA Statement on p-Values: Context, Process, and Purpose","volume":"70","author":"Wasserstein","year":"2016","journal-title":"Am. Stat."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1177\/0022343309356491","article-title":"The Perils of Policy by p-value: Predicting Civil Conflict","volume":"47","author":"Ward","year":"2010","journal-title":"J. Peace Res."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Basuchoudhary, A., Bang, J.T., Sen, T., and David, J. (2021). Identifying the Complex Causes of Civil War: Causal Interpretations of Machine Learning Technologies, Palgrave-MacMillan.","DOI":"10.1007\/978-3-030-81993-4"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1023\/A:1019969119090","article-title":"September 11, 2001","volume":"112","author":"Shughart","year":"2002","journal-title":"Public Choice"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1007\/s11127-006-9043-y","article-title":"An Analytical History of Terrorism, 1945\u20132000","volume":"128","author":"Shughart","year":"2006","journal-title":"Public Choice"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1080\/1024269032000052923","article-title":"How to Fight Terrorism: Alternatives to Deterrence","volume":"14","author":"Frey","year":"2003","journal-title":"Def. Peace Econ."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1080\/1024269052000344855","article-title":"Terror Support and Recruitment","volume":"16","author":"Faria","year":"2005","journal-title":"Def. Peace Econ."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/s11127-004-6166-x","article-title":"Rewarding Policemen Increases Crime. Another Surprising Result from the Inspection Game","volume":"121","author":"Andreozzi","year":"2004","journal-title":"Public Choice"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"976","DOI":"10.1287\/opre.1070.0434","article-title":"Balancing terrorism and natural disasters\u2014Defensive strategy with endogenous attacker effort","volume":"55","author":"Zhuang","year":"2007","journal-title":"Oper. Res."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1111\/j.1468-2478.2006.00406.x","article-title":"Distribution of Transnational Terrorism among Countries by Income Class and Geography after 9\/11","volume":"50","author":"Enders","year":"2006","journal-title":"Int. Stud. Q."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1942","DOI":"10.1016\/j.jpubeco.2008.03.007","article-title":"Religion, terrorism and public goods: Testing the club model","volume":"92","author":"Berman","year":"2008","journal-title":"J. Public Econ."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1177\/0022343310394472","article-title":"Transnational terrorism, US military aid, and the incentive to misrepresent","volume":"48","author":"Bapat","year":"2011","journal-title":"J. Peace Res."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1257\/aer.102.3.267","article-title":"The nonlinear relationship between terrorism and poverty","volume":"102","author":"Enders","year":"2012","journal-title":"Am. Econ. Rev."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1257\/jep.31.2.87","article-title":"Machine learning: An applied econometric approach","volume":"31","author":"Mullainathan","year":"2017","journal-title":"J. Econ. Perspect."},{"key":"ref_16","unstructured":"Hand, D., Mannila, H., and Smyth, P. (2001). Principles of Data Mining, MIT Press."},{"key":"ref_17","unstructured":"Ripley, B., and Venables, W. (2016). R Package \u2018nnet\u2019 Version 7.3-12, R Foundation for Statistical Computing. Available online: https:\/\/cran.r-project.org\/web\/packages\/nnet\/nnet.pdf."},{"key":"ref_18","unstructured":"Breiman, L., Friedman, R.A., Stone, C.J., and Olshen, R.A. (1984). Classification and Regression Trees, Chapman and Hall."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/BF00116037","article-title":"The strength of weak learnability","volume":"5","author":"Schapire","year":"1990","journal-title":"Mach. Learn."},{"key":"ref_20","first-page":"148","article-title":"Experiments with a new boosting algorithm","volume":"96","author":"Freund","year":"1996","journal-title":"ICML"},{"key":"ref_21","first-page":"313","article-title":"Using output codes to boost multiclass learning problems","volume":"97","author":"Schapire","year":"1997","journal-title":"ICML"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1189","DOI":"10.1214\/aos\/1013203451","article-title":"Greedy function approximation: A gradient boosting machine","volume":"29","author":"Friedman","year":"2001","journal-title":"Ann. Stat."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/BF00058655","article-title":"Bagging predictors","volume":"24","author":"Breiman","year":"1996","journal-title":"Mach. Learn."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","article-title":"Random forests; Machine learning","volume":"45","author":"Breiman","year":"2001","journal-title":"Mach. Learn."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/s11127-011-9873-0","article-title":"Lock, stock, and barrel: A comprehensive assessment of the determinants of terror","volume":"149","author":"Gassebner","year":"2011","journal-title":"Public Choice"},{"key":"ref_26","unstructured":"Banks, A.S., and Wilson, K.A. (2015). Cross-National Time-Series Data Archive, Databanks International. Available online: http:\/\/www.databanksinternational.com."},{"key":"ref_27","unstructured":"Cruz, C., Keefer, P., and Scartascini, C. (2016). Database of Political Institutions Codebook, 2015 Update (DPI2015), Inter-American Development Bank."},{"key":"ref_28","unstructured":"PRS Group (2015). International Country Risk Guide, PRS Group. Available online: http:\/\/epub.prsgroup.com\/products\/international-country-risk-guide-icrg."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1267","DOI":"10.1111\/ssqu.12295","article-title":"The Standardized World Income Inequality Database*","volume":"97","author":"Solt","year":"2016","journal-title":"Soc. Sci. Q."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1177\/0022002702046001003","article-title":"Ethnicity, Political Systems, and Civil Wars","volume":"46","year":"2002","journal-title":"J. Confl. Resolut."},{"key":"ref_31","unstructured":"Mira, A.N. (1964). Moscow: Miklukho-maklai ethnological institute at the department of geodesy and cartography of the state geological committee of the soviet union. USSR."},{"key":"ref_32","unstructured":"Basuchoudhary, A., Bang, J.T., Sen, T., and David, J. (2018). Predicting Hotspots: Using Machine Learning to Understand Civil Conflict, Rowman & Littlefield."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1017\/S0020818315000351","article-title":"Provocation and the Strategy of Terrorist and Guerrilla Attacks","volume":"70","author":"Carter","year":"2016","journal-title":"Int. Organ."},{"key":"ref_34","unstructured":"Madon, T.D., and Mitchell, S.M. (2016). State capacity, regime type, and civil war. What Do We Know about Civil Wars, Rowman and LittleField."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1177\/0022343310361838","article-title":"Measuring state capacity: Theoretical and empirical implications for the study of civil conflict","volume":"47","author":"Hendrix","year":"2010","journal-title":"J. Peace Res."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"941","DOI":"10.1111\/ajps.12028","article-title":"Autocracies and Terrorism: Conditioning Effects of Authoritarian Regime Type on Terrorist Attacks","volume":"57","author":"Wilson","year":"2013","journal-title":"Am. J. Politi- Sci."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1257\/jep.28.2.3","article-title":"Big data: New tricks for econometrics","volume":"28","author":"Varian","year":"2014","journal-title":"J. Econ. Perspect."},{"key":"ref_38","first-page":"43","article-title":"The evolution of revolution: Is splintering inevitable?","volume":"13","author":"Basuchoudhary","year":"2018","journal-title":"Econ. Peace Secur. J."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1111\/j.1540-5907.2005.00139.x","article-title":"The quality of terror","volume":"49","year":"2005","journal-title":"Am. J. Political Sci."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"651","DOI":"10.1093\/qje\/qjr015","article-title":"Growth in the Shadow of Expropriation","volume":"126","author":"Aguiar","year":"2011","journal-title":"Q. J. Econ."}],"container-title":["Games"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-4336\/12\/3\/54\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T06:23:55Z","timestamp":1760163835000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-4336\/12\/3\/54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,30]]},"references-count":40,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2021,9]]}},"alternative-id":["g12030054"],"URL":"https:\/\/doi.org\/10.3390\/g12030054","relation":{},"ISSN":["2073-4336"],"issn-type":[{"value":"2073-4336","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,30]]}}}