52:
good at categorizing and recognizing discrete objects and concepts, but often lack the ability to make effective aggregate judgments." Being able to use humans and computers allows analysts to separate data quickly and effectively to determine what is or is not an act of violence. Analysts can then code them into the database, and the WITS system then made a logical decision on whether the act meets the criteria for terrorism. Having the computer assist NCTC with what is or is not terrorism allowed an analyst to compare the computer’s answer with human thinking about the attack.
36:
consideration. Data was collected in a variety of ways. The NCTC gathered data from open sources manually using commercial subscription news services, the USG's Open Source Center (OSC), local news websites reported in
English, and, as permitted by the linguistic capabilities of the team, local news websites reported in foreign languages. Team members on the NCTC read and reviewed each article. A senior intelligence analyst provided quality control over his or her team. The senior analyst reviewed each article to maintain consistency before publishing to the database.
193:
51:
NCTC designed the WITS data coding process to make the best use of humans and computers. There is evidence to suggest that statistical models based on expert human judgment in older cases tend to outperform the same expert human judgment in newer cases. John Wiggle says, "Studies show that humans are
39:
To reduce interpretation bias further (or increase inter-rater reliability), NCTC has analysts maintained account notes of commonly used terms and phrases found in the press, recurring political and ethnic issues, terrain notes, weather related trends, and other factors that influence a mastery of
35:
When collecting data WITS addressed two areas of concern: it practiced basic knowledge management techniques to ensure consistency in data collection and it cast a wider net on political violence than what may be considered terrorism. Casting a wider net ensured all candidate events are given fair
20:(WITS) was the US government's database on tracking acts of terrorism. It contained details about incidents of violence against civilians and non-combatants (including military personnel and assets outside of war-like settings) from publicly viewable information.
43:
To ensure WITS would give fair and proper consideration to all the events available in open source, WITS collected information on attacks that have any indications of terrorism.
27:(GTD), which can be downloaded from the National Consortium for the Study of Terrorism and Responses to Terrorism (START) website at the University of Maryland.
221:
216:
24:
170:
182:
23:
The
National Counterterrorism Center (NCTC) discontinued WITS in 2012 and was merged into the
40:
context surrounding acts of violence in countries assigned to their area of responsibility.
210:
197:
186:
192:
196:
Material was copied from this source, which is available under a
171:"Introducing the Worldwide Incidents Tracking System (WITS)"
60:
As of
September 2010, WITS contained over 68,939 records.
63:
The database was organized in the following dimensions:
198:
Creative
Commons Attribution-ShareAlike 3.0 Unported
8:
164:
162:
160:
158:
156:
154:
152:
150:
115:Included Facility Targeted Characteristics
109:Included Facility Defining Characteristics
94:ICN: An incident number of form YYYYMMDDXX
146:
7:
18:Worldwide Incidents Tracking System
14:
191:
112:Included Facility Nationalities
1:
118:Included Group Nationalities
238:
169:Wigle, John (2010-11-29).
133:WITS Child Record ParentID
175:Perspectives on Terrorism
25:Global Terrorism Database
130:Victim Incident Country
121:Perpetrator Confidence
47:Humans and computers
222:Terrorism databases
97:Incident Group Type
229:
217:Counterterrorism
201:
195:
190:
166:
124:Provinces States
103:Incident Summary
100:Incident Subject
88:Geocode Province
237:
236:
232:
231:
230:
228:
227:
226:
207:
206:
205:
204:
168:
167:
148:
143:
85:Geocode Country
79:Facilities Type
58:
49:
33:
31:Data collection
12:
11:
5:
235:
233:
225:
224:
219:
209:
208:
203:
202:
145:
144:
142:
139:
138:
137:
134:
131:
128:
125:
122:
119:
116:
113:
110:
107:
104:
101:
98:
95:
92:
89:
86:
83:
82:Geocode Anchor
80:
77:
74:
71:
68:
57:
54:
48:
45:
32:
29:
13:
10:
9:
6:
4:
3:
2:
234:
223:
220:
218:
215:
214:
212:
199:
194:
188:
184:
180:
176:
172:
165:
163:
161:
159:
157:
155:
153:
151:
147:
140:
135:
132:
129:
126:
123:
120:
117:
114:
111:
108:
106:Incident Year
105:
102:
99:
96:
93:
90:
87:
84:
81:
78:
75:
72:
69:
66:
65:
64:
61:
55:
53:
46:
44:
41:
37:
30:
28:
26:
21:
19:
178:
174:
127:Related Term
62:
59:
50:
42:
38:
34:
22:
17:
15:
211:Categories
141:References
91:Group Type
76:Event Type
187:2334-3745
200:license.
70:Country
56:Content
185:
136:Weapon
73:Damage
181:(1).
183:ISSN
67:City
16:The
213::
177:.
173:.
149:^
189:.
179:4
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.