With so many different forms of data collection on conflict and violence types and locations, it is often difficult to know how these various data compare and to what extent they describe and record the same events.…
Details
Since the beginning of 2015, numerous offensives have been launched by the Armed Forces of the Democratic Republic of Congo (FARDC). These include operations against Rwandan FDLR rebels in North and South Kivu and Katanga, Ugandan ADF rebels in the areas north of the town of Beni (which has been the site of frequent attacks on civilians), the FNL around the Uvira plateaus, FRPI militiamen in the territory of Walendu Bindi, and the APCLS in the Lukweti area.…
Details
From December 2014 to February 2015, there was a significant lull in violence on all fronts in Libya. This is concurrent with a dramatic decrease in Libya Dawn (Fajr Libya) activity, especially from the Misratan battalions (see Figure 1).…
Details
Conflict levels fell dramatically in May 2015 after South Africa suffered a wave of xenophobic and anti-foreigner violence in April. The scale of the violence surpassed the anti-foreigner riots that hit Soweto in January 2015 after an alleged robber was shot by a Somali shopkeeper, prompting South African residents to loot foreign-owned shops.…
Details
Sustained collective action in the lead up to, over the course of, and in the fallout from, the Arab Spring uprisings in 2011 has resulted in a rising trend of riots and protests, and an intensification in the violence witnessed across these events.…
Details
When working with quantitative data, it is often necessary to merge data from multiple datasets. For example, one might want to combine conflict data at the country-level from ACLED with data on health, climate change, gender, etc.…
Details
The growth of online media and easily accessible information has enabled conflict data projects to provide a granular and detailed picture of conflict dynamics with geographically and temporally discrete events (Gleditsch et al.,…
Details
A unit of relative risk is necessary in order to be able to draw comparisons on the risk of violence or death against civilians from political conflict. A micromort is such a measure, and is often used to determine the ‘riskiness’ of various activities within decision analysis (Howard, 1980).…
Details
Unidentified armed groups (UAGs) constitute a large share of violent actors in the ACLED dataset; approximately 15% of organized, armed conflict carried out by violent actors (e.g., government forces, rebels, political militias, communal militias, external forces) are at the hands of UAGs. …
Details
ACLED Asia has released the most up-to-date version of the Asia data, covering the time period of January to March 2015. The data covers eleven states including India, Pakistan, Sri Lanka, Nepal, Bangladesh, Bhutan, Cambodia, Laos, Vietnam, Thailand and Myanmar.…
Details
We use cookies to optimize our website and our service.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
We use cookies to optimize our website and our service.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.