Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingPhysical Security

Disrupting the status quo: Data-driven analysis of terrorism

By Aaron Tran
data-analysis-freepik9786543.jpg
September 14, 2021

As any effective manager knows, you can’t manage what you can’t measure. Since September 11, 2001, how best to measure – and therefore manage – terrorism risk has been an ongoing quest. Protecting people, property and information from security threats at an operational level requires reliable measurement methods as a solid foundation for security precautions, plans, policies and other responses. 


Current terrorism risk assessment measurement methods rely on subjective and intuitive judgments and have questionable accuracy and reliability. Structured forms of risk assessments, like risk matrixes, create standard scores or ranks from the information input by human users. While they produce consistent and reliable results, they are only as good as the information entered into them. In other words, quality inputs produce quality outputs. The inputs to these risk assessments are subject to bias and fallacies, like all human interactions. They are, essentially, qualitative judgments translated into quantitative values. 


Human flaws undermine most existing forms of measurement. Individuals tend to be overconfident in their ability to intuitively and subjectively assess risks. What’s more, individual judgment is inconsistent – even when presented with the exact same situation, no two people’s reactions are identical. Even experienced risk managers are likely to rely on a common human trait, that is, making judgments on the last, most easily retrievable and vivid memory or image of a particular subject. Such risk assessments are a source of risk in themselves.


Every successful terrorist attack is a failure of terrorism risk management. To maximize our chances of success, we need assessment methods driven by systematic data-driven analysis. There have been rapid advances in technological approaches to risk assessment, but to date, developments in data-driven analysis of terrorism have been largely academic.


They are also fairly high-level, looking at terrorism risk at a national or regional level rather than the very localized level required by risk managers and security professionals who are focused on risk across and within specific buildings and sites.


Academic research is helpful in identifying the root causes of terrorism at a national and regional level, typically focusing on distribution and frequency, such as how many terrorist attacks might occur in one country compared to another. This information is valuable for policymaking but has limited application for operational decision-making regarding terrorism risk.


What is needed for managers is terrorism risk assessments that establish the likelihood of an attack, its chances of success, and the extent of damage, cost, or losses. This information has very specific and significant implications for operational decision-making and management of terrorism risk, such as what additional security measures, plans and policies should be implemented. 


Data-driven methods can provide these kinds of risk assessments. But absolutely crucial, they must also be accessible and practical enough to be used by a range of different organizations to inform their operational risk management decisions. 


A barrier, to date, has been not only the lack of practicality in data-driven approaches but also the cost. Statistical modeling of risk is more resource-intensive than existing methods due to the need to gather and maintain databases, select appropriate modeling methods, train and test algorithms, and then interpret the results.


While the cost of developing these data-driven risk assessment systems may be relatively high, once the system is established, the per-unit cost of conducting risk assessments using data-driven methods is significantly less, while potentially providing far superior results and information.


Statistical modeling of risk is complex and requires specialist knowledge that is outside the skill set of most security and risk practitioners. However, this can be addressed by developing software that conducts the statistical analysis, with the user simply providing the required inputs. 


This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security Magazine. Subscribe here.



KEYWORDS: Counterintelligence data analysis risk assessment risk management terrorism

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Aaron tran

Aaron Tran is the Co-Founder of Vardogyir. Tran has worked as a consultant and terrorism researcher on projects across critical infrastructure, energy, and government. He has worked on strategic reviews of current security policies and procedures for critical infrastructure assets. Tran graduated from the University of New South Wales where his work was recognized through several industry awards and scholarships for his research on terrorism and national security.

 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • jupiterone_reinventing-cybersecurity-book-teaser_hero.jpg

    Female & non-binary security practitioners challenge status quo with collection of stories

    See More
  • digital landscape

    Unlocking digital trust: The power of collaboration in a data-driven world

    See More
  • Digital Trust

    Unlocking digital trust: The power of collaboration in a data-driven world

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing