{"dcterms:modified":"2025-04-01","dcterms:creator":"Harvard Dataverse","@type":"ore:ResourceMap","schema:additionalType":"Dataverse OREMap Format v1.0.1","dvcore:generatedBy":{"@type":"schema:SoftwareApplication","schema:name":"Dataverse","schema:version":"6.6 build 1829-192cdc4","schema:url":"https://github.com/iqss/dataverse"},"@id":"https://dataverse.harvard.edu/api/datasets/export?exporter=OAI_ORE&persistentId=https://doi.org/10.7910/DVN/QUKFFH","ore:describes":{"author":{"citation:authorName":"Mir, Asfandyar","citation:authorAffiliation":"Stanford University"},"citation:datasetContact":{"citation:datasetContactName":"Mir, Asfandyar","citation:datasetContactAffiliation":"Stanford University","citation:datasetContactEmail":"asfandyar@uchicago.edu"},"citation:dsDescription":{"citation:dsDescriptionValue":"Appendix for Asfandyar Mir, \"What Explains Counterterrorism Effectiveness? Evidence from the U.S. Drone War in Pakistan,\" International Security, Vol. 43, No. 2 (Fall 2018), pp. 45–83, doi:10.1162/isec_a_00331. This appendix contains details on the fieldwork, a summary of interview data, the protocol for interviews, challenges to the interview process, documents obtained through fieldwork cited in the main text, longitudinal coding of key indicators, and some additional narrative details relevant to the research design."},"title":"Appendix for Asfandyar Mir, \"What Explains Counterterrorism Effectiveness? Evidence from the U.S. Drone War in Pakistan,\" International Security, Vol. 43, No. 2 (Fall 2018), pp. 45–83, doi:10.1162/isec_a_00331.","dateOfDeposit":"2018-09-18","subject":"Social Sciences","citation:depositor":"Mir, Asfandyar","@id":"https://doi.org/10.7910/DVN/QUKFFH","@type":["ore:Aggregation","schema:Dataset"],"schema:version":"1.0","schema:name":"Appendix for Asfandyar Mir, \"What Explains Counterterrorism Effectiveness? Evidence from the U.S. Drone War in Pakistan,\" International Security, Vol. 43, No. 2 (Fall 2018), pp. 45–83, doi:10.1162/isec_a_00331.","schema:dateModified":"Wed Nov 07 15:10:53 UTC 2018","schema:datePublished":"2018-11-07","schema:creativeWorkStatus":"RELEASED","schema:license":"http://creativecommons.org/publicdomain/zero/1.0","dvcore:fileTermsOfAccess":{"dvcore:fileRequestAccess":false},"schema:includedInDataCatalog":"Harvard Dataverse","schema:isPartOf":{"schema:name":"International Security Dataverse","@id":"https://dataverse.harvard.edu/dataverse/isec","schema:description":"Dataverse for International Security quarterly journal","schema:isPartOf":{"schema:name":"Harvard Dataverse","@id":"https://dataverse.harvard.edu/dataverse/harvard","schema:description":"<span><span><span><h3>Share, archive, and get credit for your data. Find and cite data across all research fields.</h3></span></span></span>"}},"ore:aggregates":[{"schema:description":"This document contains additional details regarding the fieldwork and interview data used in the article.","schema:name":"ISappendix_online.pdf","dvcore:restricted":false,"schema:version":1,"dvcore:datasetVersionId":141870,"@id":"doi:10.7910/DVN/QUKFFH/GHZWDM","schema:sameAs":"https://dataverse.harvard.edu/api/access/datafile/:persistentId?persistentId=doi:10.7910/DVN/QUKFFH/GHZWDM","@type":"ore:AggregatedResource","schema:fileFormat":"application/pdf","dvcore:filesize":581638,"dvcore:storageIdentifier":"s3://dvn-cloud:166e7264eaf-7d6c8af1c211","dvcore:rootDataFileId":-1,"dvcore:checksum":{"@type":"MD5","@value":"40e0f3f6cf14936697e9d4b871d0d453"}}],"schema:hasPart":["doi:10.7910/DVN/QUKFFH/GHZWDM"]},"@context":{"author":"http://purl.org/dc/terms/creator","citation":"https://dataverse.org/schema/citation/","dateOfDeposit":"http://purl.org/dc/terms/dateSubmitted","dcterms":"http://purl.org/dc/terms/","dvcore":"https://dataverse.org/schema/core#","ore":"http://www.openarchives.org/ore/terms/","schema":"http://schema.org/","subject":"http://purl.org/dc/terms/subject","title":"http://purl.org/dc/terms/title"}}