<s>
The	O
International	B-Application
Terrorism	I-Application
:	I-Application
Attributes	I-Application
of	I-Application
Terrorist	I-Application
Events	I-Application
project	O
,	O
commonly	O
known	O
as	O
ITERATE	O
,	O
records	O
data	O
regarding	O
transnational	O
terrorist	O
groups	O
and	O
their	O
activities	O
.	O
</s>
<s>
It	O
is	O
one	O
of	O
the	O
most	O
comprehensive	O
databases	O
of	O
its	O
type	O
;	O
most	O
academic	O
research	O
in	O
the	O
field	O
stems	O
from	O
either	O
ITERATE	O
or	O
the	O
Global	B-Application
Terrorism	I-Application
Database	I-Application
.	O
</s>
<s>
Published	O
by	O
Vinyard	O
Software	O
,	O
it	O
is	O
available	O
as	O
a	O
qualitative	O
textual	O
chronology	B-Application
from	O
1960-present	O
and	O
a	O
quantitative	O
numerically	O
coded	O
database	O
from	O
1968-present	O
.	O
</s>
<s>
The	O
"	O
Hostage	B-Device
File	O
"	O
records	O
41	O
variables	O
specific	O
to	O
events	O
involving	O
hostage-taking	B-Device
.	O
</s>
<s>
ITERATE	O
predominately	O
utilises	O
open-source	B-Algorithm
data	O
collection	O
such	O
as	O
academic	O
research	O
and	O
media	O
articles	O
.	O
</s>
<s>
The	O
use	O
of	O
open-source	B-Algorithm
data	O
collection	O
methods	O
has	O
both	O
pros	O
and	O
cons	O
:	O
</s>
