2016
DOI: 10.1080/1057610x.2016.1141000
|View full text |Cite
|
Sign up to set email alerts
|

Speaking Truth to Sources: Introducing a Method for the Quantitative Evaluation of Open Sources in Event Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…Certainly, as Behlendorf, Belur, and Kumar (2016) maintained, open-source databases can overrepresent those incidents that cause causalities. Second, as Ackerman and Pinson (2016) stated, the possibility of credibility and validity issues exists. With regard to terrorism research, there are no existing data sets that evaluate such factors (Ackerman & Pinson, 2016).…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Certainly, as Behlendorf, Belur, and Kumar (2016) maintained, open-source databases can overrepresent those incidents that cause causalities. Second, as Ackerman and Pinson (2016) stated, the possibility of credibility and validity issues exists. With regard to terrorism research, there are no existing data sets that evaluate such factors (Ackerman & Pinson, 2016).…”
Section: Discussionmentioning
confidence: 99%
“…Second, as Ackerman and Pinson (2016) stated, the possibility of credibility and validity issues exists. With regard to terrorism research, there are no existing data sets that evaluate such factors (Ackerman & Pinson, 2016). Given these limitations, the GTD is still arguably the most comprehensive and well-defined open-source database of terrorist incidents in existence.…”
Section: Discussionmentioning
confidence: 99%
“…While there has been a continued effort in the field of corrections to critically examine the phenomenon of jail suicides, researchers have yet to incorporate open-source databases in their analyses. Also referred to as publicly available data, open-source search protocols have been frequently utilized to develop datasets to study a diverse range of social science phenomena (see Ackerman and Pinson 2016 ; Chandra et al 2014 ; Gruenwald et al 2013 ), particularly those surrounding controversial social issues (Ackerman and Pinson 2016 ). However, it is critical that researchers building open-source datasets explicitly engage in a rigorous evaluation process of both the source(s) and information gathered (Ackerman and Pinson 2016 ).…”
Section: Introductionmentioning
confidence: 99%
“…Also referred to as publicly available data, open-source search protocols have been frequently utilized to develop datasets to study a diverse range of social science phenomena (see Ackerman and Pinson 2016 ; Chandra et al 2014 ; Gruenwald et al 2013 ), particularly those surrounding controversial social issues (Ackerman and Pinson 2016 ). However, it is critical that researchers building open-source datasets explicitly engage in a rigorous evaluation process of both the source(s) and information gathered (Ackerman and Pinson 2016 ). Furthermore, these researchers also posit that transparency is critical and “that any procedures should be … explicitly coded into the database itself” (Ackerman and Pinson 2016 , p. 623).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation