on findings

How Childhood Experiences Shape Belief Systems: Psychology behind the Ritchie case

Posted on

How Childhood Experiences Shape Belief Systems: Psychology behind the Ritchie case Megan Roques (@meganroques) When coding cases, we examine multiple cases with various motivations in order to determine if they fit the inclusion criteria. Lately, most of the cases that I have found have been the result of scraping documents and databases. Therefore, coding these […]

on process

The Process and Difficulties of Coding the Twenty-Year Old 1998 U.S. Embassy Bombings Case

Posted on

The Process and Difficulties of Coding the Twenty-Year Old 1998 U.S. Embassy Bombings Case Sara Godfrey On August 7th, 1998, trucks armed with explosives simultaneously detonated outside U.S. embassies in Dar Es Salaam, Tanzania and Nairobi, Kenya, bringing public attention for many to al-Qaeda for the first time. The explosions killed 224 people and injured […]

on findings

Gender Disparities in Crimes of Political Violence: Revealing tPP’s Strengths and Limitations

Posted on

Gender Disparities in Crimes of Political Violence: Revealing tPP’s Strengths and Limitations Kayla Groneck Taking a step back from coding further cases for the dataset, tPP’s researchers wanted to take the time to answer some of the questions which had arisen around the trends we identified over months of researching and coding prosecutions of political […]

on process

Source Files for Older Cases: Luck or Skill?

Posted on

Source Files for Older Cases: Luck or Skill? Katherine Coate Finding accurate source files is an integral part of coding cases because it is how we find the information to correctly fill in variables. Some cases, especially more well-known cases, are easy to find, but others, especially older cases, take a lot of digging and […]

on process

Future Considerations: Relationship to the Group Variable

Posted on

Future Considerations: Relationship to the Group Variable Nitya Sunil Salman Rashid was arrested for contacting a confidential human source who he assumed was a member of the Islamic State of Iraq and Syria, or ISIS. The Department of Justice stated that Rashid wanted to instruct members of ISIS to conduct an attack on his behalf […]

on process

Who & What Defines Terrorism? & How Much Trust Do We Put Into Our Sources?: Subjectivity and credibility when defining & coding terrorism

Posted on

Who and What Defines Terrorism? & How Much Trust Do We Put Into Our Sources?: The issue of subjectivity and credibility when defining and coding terrorism Catie Barry Of the many challenges posed when doing team-based research, consistency in coding and the process is essential when doing qualitative coding. To have a consistent method of […]