Volume 2 · Issue 3 (2025)
Characterization of The Temporal and Spatial Evolution of Terrorist Attacks in The China-Pakistan Economic Corridor
Yuhang Rong, Aihong Jiao
School of Foreign-related Security, People's Police University of China, Langfang, Hebei, China
Abstract: The construction of China-Pakistan Economic Corridor (CPEC) project is of great significance, but the terrorist threat facing Pakistan brings a series of security risks to it. Based on the Global Terrorism Database (GTD), this paper investigates the spatial and temporal evolution characteristics of terrorist attacks in the China-Pakistan Economic Corridor. The spatial autocorrelation method and standard deviation ellipse method are applied to comprehensively evaluate the distribution of different terrorist attacks. The results show that in terms of time evolution, the terrorist risk value of terrorist attacks in the China-Pakistan Economic Corridor presents four stages of surge, active, sharp drop and slow drop ; in terms of spatial distribution, terrorist attacks are concentrated in the upper and lower reaches of the west line of the corridor, the lower reaches of the east line and the middle and lower reaches of the middle line, and the degree of danger shows positive spatial autocorrelation. In terms of spatial and temporal evolution characteristics, the positive spatial autocorrelation of the degree of danger in each stage is stable, and the distribution range, trend and center of gravity of the attack show specific rules.
Keywords: Overseas Security; Terrorist Attacks; China-Pakistan Economic Corridor; Spatio-Temporal Evolution Characteristics; GIS
References
[1]
Gao Bai,Zhen Zhihong. Political economy analysis of China-Pakistan economic corridor. Beijing:Social Science Literature Press,2017:8.
[2]
Liu Le. Ten-year construction effectiveness of the China-Pakistan Economic Corridor: differentiated evaluation and problem analysis[J]. South Asian Studies, 2023, (04):1-24+153. DOI:10.16608/j.cnki.nyyj.2023.04.01.
[3]
CHEN Jiyong, LI Zhirui. "Terrorism and export trade in the neighboring countries of the China-Pakistan Economic Corridor:A new research paradigm of gravity model[J]. Economic Science, 2020(3):31 45.
[4]
National Consortium for the Study of Terrorism and Responses to Terrorism. GTD | Global Terrorism Database. (2022-7-30) [2022-08-09]. https://start.umd.edu/gtd/
[5]
Hou Zhiwen. Analysis and posture prediction of terrorist attacks based on terrorist organization networks[D]. People's Public Security University of China, 2024. DOI:10.27634/d.cnki.gzrgu.2024.000027
[6]
Shen Yukun. Research on the spatio-temporal evolution of geopolitical fragmentation zones along the "Belt and Road". Yunnan Normal University, 2024. DOI:10.27459/d.cnki.gynfc.2024.000008
[7]
Gao Hongliang,Chen Hongshan,Hou Fangdi,et al. Spatio-temporal multi-graph convolutional network terrorist event modeling under resilient power grid. Journal of Harbin Institute of Technology,1-10[2024-12-25]. http://kns.cnki.net/kcms/detail/23.1404.n.20240405.1933.014.html
[8]
XU Shuncong, YANG Yongbin, ZHANG Shiwei, et al. Characterization of Spatial Distribution of Terrorist Attacks in Pakistan Based on Threat Degree Evaluation. Journal of Chinese People's Police University,2024,40(03):67-78.
[9]
ZHAO Guanzhou, YANG Yongbin. A study on the spatial and temporal evolution characteristics of terrorist attacks in the Gulf of Guinea. Geospatial Information,2023,21(10):36-40.
[10]
Saaty, T.L. How to Make a Decision: The Analytic Hierarchy Process. Eur. J. Oper. Res. 1994, 48, 9-26.
[11]
Regulations on the Reporting and Investigation of Production Safety Accidents. People's Daily, 2007-04-21(007).
[12]
Li, Z.; Li, X.; Dong, C.; Guo, F.; Zhang, F.; Zhang, Q. Quantitative Analysis of Global Terrorist Attacks Based on the Global Terrorism Database. Sustainability 2021, 13, 7598. https://doi.org/10.3390/su13147598
[13]
HONG Zeshui, LIAO Guowei, LONG Zhangbiao, et al. Research on safety risk assessment of railroad cable-stayed bridge construction based on gray correlation degree-cloud model. Transportation Energy Conservation and Environmental Protection,2024,20(S2):146-154.
Download PDF