151 to 160 of 324 Results
MS Excel Spreadsheet - 339.5 KB -
MD5: 1e56c1dba4399d3cb5a322116d36ea87
|
Tabular Data - 323.7 KB - 22 Variables, 2714 Observations - UNF:6:26NVi/dHxqOLZq7UsTr9/w==
|
Apr 28, 2021
Meijer, Hugo; Brooks, Stephen G., 2021, "Appendix for 'Illusions of Autonomy: Why Europe Cannot Provide for Its Security If the United States Pulls Back,' International Security, Vol. 45, No. 4 (Spring 2021), pp.7–43, doi.org/10.1162/isec_a_00405", https://doi.org/10.7910/DVN/L3W8XF, Harvard Dataverse, V3
Appendix for 'Illusions of Autonomy: Why Europe Cannot Provide for Its Security If the United States Pulls Back,' International Security, Vol. 45, No. 4 (Spring 2021), pp. 7–43, doi.org/10.1162/isec_a_00405 |
Adobe PDF - 915.7 KB -
MD5: df43d2d3b7f9fe9a4adda2f312dc367a
|
Apr 20, 2021
Nussio, Enzo; Ugarriza, Juan E., 2021, "Appendix for 'Why Rebels Stop Fighting: Organizational Decline and Desertion in Colombia’s Insurgency,' International Security, Vol. 45, No. 4 (Spring 2021), pp. 167–203, doi.org/10.1162/isec_a_00406", https://doi.org/10.7910/DVN/TBIELH, Harvard Dataverse, V1, UNF:6:gKVqnwJUhfa3FjSHzmLNcw== [fileUNF]
Appendix for 'Why Rebels Stop Fighting: Organizational Decline and Desertion in Colombia’s Insurgency,' International Security, Vol. 45, No. 4 (Spring 2021), pp. 167–203, doi.org/10.1162/isec_a_00406 |
Adobe PDF - 1.2 MB -
MD5: ef6477fb91a880ac0c828827266c2e56
|
Stata Syntax - 68.6 KB -
MD5: 93f70fc2be04f206f9749b6d263213a3
|
Tabular Data - 2.1 MB - 60 Variables, 6129 Observations - UNF:6:OkkZBn0ndwCyvIyvu2kOog==
|
Tabular Data - 73.5 KB - 22 Variables, 552 Observations - UNF:6:wSOjQF2oHBL6tXUkM3cyKQ==
|
Apr 20, 2021
Tecott, Rachel; Halterman, Andrew, 2021, "Appendix for 'The Case for Campaign Analysis: A Method for Studying Military Operations,' International Security, Vol. 45, No. 4 (Spring 2021), pp. 44–83, doi.org/10.1162/isec_a_00408", https://doi.org/10.7910/DVN/998QEK, Harvard Dataverse, V1
Appendix for 'The Case for Campaign Analysis: A Method for Studying Military Operations,' International Security, Vol. 45, No. 4 (Spring 2021), pp. 44–83, doi.org/10.1162/isec_a_00408 |