101 to 110 of 20,315 Results
Tabular Data - 43.8 KB - 50 Variables, 143 Observations - UNF:6:kHHUAR3GnBmwLZH9q86xlA==
Main dataset for the analysis. |
Stata Syntax - 49.2 KB -
MD5: a4b4bf8e79a0ba4b8799b1ed3dc126b8
|
Adobe PDF - 74.8 KB -
MD5: dec100a13848ab832a576dd1cc50b5b2
|
Adobe PDF - 132.3 KB -
MD5: d0a8e48d9cddd9b9d4e264be778e6ef8
|
Adobe PDF - 1.1 MB -
MD5: a963f59729bcfba9d00fb6d26a5f7fc7
|
JPEG Image - 174.4 KB -
MD5: 0c72b87a6e01c3ed9d154c761645bd6f
Figure 1 file. |
Plain Text - 7.2 KB -
MD5: 05fce0a18610b4b4a3f5f07ee449f990
|
May 22, 2025
Smith, Bradley; Bils, Peter, 2025, "Replication Data for: The Logic of Secret Alliances", https://doi.org/10.7910/DVN/ELBOXX, Harvard Dataverse, V1, UNF:6:PDZSEEjozkOpkWKjKu36sw== [fileUNF]
Alliances are typically understood as agreements intended to deter aggression from enemy states. By signaling an ally's commitment to a protege state, a shared enemy may be deterred from attacking. In light of this signaling logic, secret alliances are puzzling. Because they are not observed, secret alliances by definition cannot achieve deterrence... |
May 22, 2025 -
Replication Data for: The Logic of Secret Alliances
Gzip Archive - 94.5 KB -
MD5: f0b66d50501f11ee78caebe0e0591bb7
analysis file |
May 22, 2025 -
Replication Data for: The Logic of Secret Alliances
Unknown - 205 B -
MD5: c8d3f84a410f46d4d8b03a268e313e35
R Project file - should be run first |