{"id":3300741,"identifier":"DVN/VIXNNE","persistentUrl":"https://doi.org/10.7910/DVN/VIXNNE","protocol":"doi","authority":"10.7910","separator":"/","publisher":"Harvard Dataverse","publicationDate":"2019-06-18","storageIdentifier":"file://10.7910/DVN/VIXNNE","datasetType":"dataset","datasetVersion":{"id":146088,"datasetId":3300741,"datasetPersistentId":"doi:10.7910/DVN/VIXNNE","storageIdentifier":"file://10.7910/DVN/VIXNNE","versionNumber":1,"versionMinorNumber":0,"versionState":"RELEASED","latestVersionPublishingState":"RELEASED","deaccessionLink":"","UNF":"UNF:6:BcqInKD9NBX3NkI48CdqpQ==","lastUpdateTime":"2019-06-18T04:48:15Z","releaseTime":"2019-06-18T04:48:15Z","createTime":"2018-11-01T14:00:45Z","publicationDate":"2019-06-18","citationDate":"2019-06-18","license":{"name":"CC0 1.0","uri":"http://creativecommons.org/publicdomain/zero/1.0","iconUri":"https://licensebuttons.net/p/zero/1.0/88x31.png","rightsIdentifier":"CC0-1.0","rightsIdentifierScheme":"SPDX","schemeUri":"https://spdx.org/licenses/","languageCode":"en"},"fileAccessRequest":false,"metadataBlocks":{"citation":{"displayName":"Citation Metadata","name":"citation","fields":[{"typeName":"title","multiple":false,"typeClass":"primitive","value":"Replication Data for: High-Profile Criminal Violence.  Why Drug Cartels Murder Government Officials and Party Candidates in Mexico"},{"typeName":"author","multiple":true,"typeClass":"compound","value":[{"authorName":{"typeName":"authorName","multiple":false,"typeClass":"primitive","value":"Trejo, Guillermo"},"authorAffiliation":{"typeName":"authorAffiliation","multiple":false,"typeClass":"primitive","value":"University of Notre Dame, Department of Political Science"},"authorIdentifierScheme":{"typeName":"authorIdentifierScheme","multiple":false,"typeClass":"controlledVocabulary","value":"ORCID"},"authorIdentifier":{"typeName":"authorIdentifier","multiple":false,"typeClass":"primitive","value":"0000-0003-4286-2808 "}},{"authorName":{"typeName":"authorName","multiple":false,"typeClass":"primitive","value":"Ley, Sandra"},"authorAffiliation":{"typeName":"authorAffiliation","multiple":false,"typeClass":"primitive","value":"CIDE, Political Studies Division"},"authorIdentifierScheme":{"typeName":"authorIdentifierScheme","multiple":false,"typeClass":"controlledVocabulary","value":"ORCID"},"authorIdentifier":{"typeName":"authorIdentifier","multiple":false,"typeClass":"primitive","value":"0000-0001-8141-9273"}}]},{"typeName":"datasetContact","multiple":true,"typeClass":"compound","value":[{"datasetContactName":{"typeName":"datasetContactName","multiple":false,"typeClass":"primitive","value":"Ley, Sandra"},"datasetContactAffiliation":{"typeName":"datasetContactAffiliation","multiple":false,"typeClass":"primitive","value":"CIDE, Political Studies Division"},"datasetContactEmail":{"typeName":"datasetContactEmail","multiple":false,"typeClass":"primitive","value":"sandra.ley@cide.edu"}}]},{"typeName":"dsDescription","multiple":true,"typeClass":"compound","value":[{"dsDescriptionValue":{"typeName":"dsDescriptionValue","multiple":false,"typeClass":"primitive","value":"This article explains a surprising wave of lethal attacks by drug cartels against hundreds of local elected officials and party candidates in Mexico, 2007-2012. These attacks are puzzling because criminal organizations prefer the secrecy of bribery over the publicity of political murder. Scholars suggest that war drives armed actors to attack state authorities in search of protection or rents. Using original data of high-profile attacks in Mexico, we show that war need arguments underexplain violence. Focusing on political opportunities, we suggest that cartels use attacks to establish criminal governance regimes and conquer local governments, populations, and territories. We present quantitative and qualitative evidence showing that cartels took advantage of Mexico's political polarization and targeted subnational authorities who were unprotected by their federal partisan rivals. Cartels intensified attacks during subnational election cycles to capture incoming governments and targeted geographically adjacent municipalities to establish controls over large territories. Our findings reveal how cartels take cues from the political environment to develop their own de facto political domains through high-profile violence. These results question the widely shared assumption that organized criminal groups are apolitical actors."},"dsDescriptionDate":{"typeName":"dsDescriptionDate","multiple":false,"typeClass":"primitive","value":"2018-11-01"}}]},{"typeName":"subject","multiple":true,"typeClass":"controlledVocabulary","value":["Social Sciences"]},{"typeName":"keyword","multiple":true,"typeClass":"compound","value":[{"keywordValue":{"typeName":"keywordValue","multiple":false,"typeClass":"primitive","value":"organized crime"}},{"keywordValue":{"typeName":"keywordValue","multiple":false,"typeClass":"primitive","value":"criminal governance"}},{"keywordValue":{"typeName":"keywordValue","multiple":false,"typeClass":"primitive","value":"high-profile violence"}},{"keywordValue":{"typeName":"keywordValue","multiple":false,"typeClass":"primitive","value":"turf wars"}},{"keywordValue":{"typeName":"keywordValue","multiple":false,"typeClass":"primitive","value":"partisan vertical fragmentation"}},{"keywordValue":{"typeName":"keywordValue","multiple":false,"typeClass":"primitive","value":"election cycles"}}]},{"typeName":"notesText","multiple":false,"typeClass":"primitive","value":"This dataverse includes the relevant .do and .dta files for replicating the analyses reported in the manuscript. Please see the ReadMe file for more information on how to use these materials. "},{"typeName":"language","multiple":true,"typeClass":"controlledVocabulary","value":["English"]},{"typeName":"depositor","multiple":false,"typeClass":"primitive","value":"Ley, Sandra"},{"typeName":"dateOfDeposit","multiple":false,"typeClass":"primitive","value":"2018-11-01"}]}},"files":[{"description":"Codebook associated with main data file, \"Dataset_HighProfileCriminalViolence.dta\"","label":"Codebook_HighProfileCriminalViolence.pdf","restricted":false,"version":1,"datasetVersionId":146088,"categories":["Documentation"],"dataFile":{"id":3300748,"persistentId":"doi:10.7910/DVN/VIXNNE/EGYHB8","pidURL":"https://doi.org/10.7910/DVN/VIXNNE/EGYHB8","filename":"Codebook_HighProfileCriminalViolence.pdf","contentType":"application/pdf","friendlyType":"Adobe PDF","filesize":267872,"description":"Codebook associated with main data file, \"Dataset_HighProfileCriminalViolence.dta\"","categories":["Documentation"],"storageIdentifier":"s3://dvn-cloud:166d068e2f2-ea8eac92f8ba","rootDataFileId":-1,"md5":"112b8b0073a2ae6457df37aad2a3c3ea","checksum":{"type":"MD5","value":"112b8b0073a2ae6457df37aad2a3c3ea"},"tabularData":false,"creationDate":"2018-11-01","publicationDate":"2019-06-18","fileAccessRequest":false}},{"description":"Dataset used for regression models and maps","label":"Dataset_HighProfileCriminalViolence.tab","restricted":false,"version":2,"datasetVersionId":146088,"categories":["Data"],"dataFile":{"id":3300747,"persistentId":"doi:10.7910/DVN/VIXNNE/XH5ZQU","pidURL":"https://doi.org/10.7910/DVN/VIXNNE/XH5ZQU","filename":"Dataset_HighProfileCriminalViolence.tab","contentType":"text/tab-separated-values","friendlyType":"Tab-Delimited","filesize":1742475,"description":"Dataset used for regression models and maps","categories":["Data"],"storageIdentifier":"s3://dvn-cloud:166d06422ff-bbf535cc0e94","originalFileFormat":"application/x-stata-14","originalFormatLabel":"Stata 14 Binary","originalFileSize":1896505,"originalFileName":"Dataset_HighProfileCriminalViolence.dta","UNF":"UNF:6:p1pp2c4CbQDwUalH2VRt7w==","rootDataFileId":-1,"md5":"d75702bcfa585f0abf71c91df5c5d399","checksum":{"type":"MD5","value":"d75702bcfa585f0abf71c91df5c5d399"},"tabularData":true,"creationDate":"2018-11-01","publicationDate":"2019-06-18","fileAccessRequest":false}},{"description":"Database to generate Figure 1","label":"Figure1_timetrend_1995-2012.tab","restricted":false,"version":2,"datasetVersionId":146088,"categories":["Data"],"dataFile":{"id":3300743,"persistentId":"doi:10.7910/DVN/VIXNNE/OJUVS3","pidURL":"https://doi.org/10.7910/DVN/VIXNNE/OJUVS3","filename":"Figure1_timetrend_1995-2012.tab","contentType":"text/tab-separated-values","friendlyType":"Tab-Delimited","filesize":218,"description":"Database to generate Figure 1","categories":["Data"],"storageIdentifier":"s3://dvn-cloud:166d0671c9f-ad90f2a1e0f7","originalFileFormat":"application/x-stata-14","originalFormatLabel":"Stata 14 Binary","originalFileSize":3205,"originalFileName":"Figure1_timetrend_1995-2012.dta","UNF":"UNF:6:9ezlpIIoqYOvaRuP82KsGA==","rootDataFileId":-1,"md5":"60a6c412d249a2dd8655a4d937e16ca4","checksum":{"type":"MD5","value":"60a6c412d249a2dd8655a4d937e16ca4"},"tabularData":true,"creationDate":"2018-11-01","publicationDate":"2019-06-18","fileAccessRequest":false}},{"description":"Database to generate Figure 2","label":"Figure2_levelgovt_2007-2012.tab","restricted":false,"version":2,"datasetVersionId":146088,"categories":["Data"],"dataFile":{"id":3300742,"persistentId":"doi:10.7910/DVN/VIXNNE/VN5ZJO","pidURL":"https://doi.org/10.7910/DVN/VIXNNE/VN5ZJO","filename":"Figure2_levelgovt_2007-2012.tab","contentType":"text/tab-separated-values","friendlyType":"Tab-Delimited","filesize":256,"description":"Database to generate Figure 2","categories":["Data"],"storageIdentifier":"s3://dvn-cloud:166d0672d4a-030a8681a9a4","originalFileFormat":"application/x-stata-14","originalFormatLabel":"Stata 14 Binary","originalFileSize":2721,"originalFileName":"Figure2_levelgovt_2007-2012.dta","UNF":"UNF:6:VFVABkTNZpooiqhCTn+CZQ==","rootDataFileId":-1,"md5":"a362d120cdcb9bf92fedfa5e44e1d72c","checksum":{"type":"MD5","value":"a362d120cdcb9bf92fedfa5e44e1d72c"},"tabularData":true,"creationDate":"2018-11-01","publicationDate":"2019-06-18","fileAccessRequest":false}},{"description":"Database to generate Figure 3","label":"Figure3_parties_2007-2012.dta.tab","restricted":false,"version":2,"datasetVersionId":146088,"categories":["Data"],"dataFile":{"id":3300744,"persistentId":"doi:10.7910/DVN/VIXNNE/CD5TCP","pidURL":"https://doi.org/10.7910/DVN/VIXNNE/CD5TCP","filename":"Figure3_parties_2007-2012.dta.tab","contentType":"text/tab-separated-values","friendlyType":"Tab-Delimited","filesize":77,"description":"Database to generate Figure 3","categories":["Data"],"storageIdentifier":"s3://dvn-cloud:166d0674858-a343a857d97e","originalFileFormat":"application/x-stata-14","originalFormatLabel":"Stata 14 Binary","originalFileSize":2543,"originalFileName":"Figure3_parties_2007-2012.dta.dta","UNF":"UNF:6:U2HEUnpN81kbjmRM0ZHQqw==","rootDataFileId":-1,"md5":"3e76fdafa0f6e7d65f908b4abbc720c1","checksum":{"type":"MD5","value":"3e76fdafa0f6e7d65f908b4abbc720c1"},"tabularData":true,"creationDate":"2018-11-01","publicationDate":"2019-06-18","fileAccessRequest":false}},{"description":"Database to generate Figure 4","label":"Figure4_attacks_vs_governed.tab","restricted":false,"version":2,"datasetVersionId":146088,"categories":["Data"],"dataFile":{"id":3300751,"persistentId":"doi:10.7910/DVN/VIXNNE/5RGMMY","pidURL":"https://doi.org/10.7910/DVN/VIXNNE/5RGMMY","filename":"Figure4_attacks_vs_governed.tab","contentType":"text/tab-separated-values","friendlyType":"Tab-Delimited","filesize":144,"description":"Database to generate Figure 4","categories":["Data"],"storageIdentifier":"s3://dvn-cloud:166d0675799-39f561314f29","originalFileFormat":"application/x-stata-14","originalFormatLabel":"Stata 14 Binary","originalFileSize":3869,"originalFileName":"Figure4_attacks_vs_governed.dta","UNF":"UNF:6:xWeYrhGIsvBonzY1bMjv8g==","rootDataFileId":-1,"md5":"ed9f0dc9ca33a0b36df12405f7c1e596","checksum":{"type":"MD5","value":"ed9f0dc9ca33a0b36df12405f7c1e596"},"tabularData":true,"creationDate":"2018-11-01","publicationDate":"2019-06-18","fileAccessRequest":false}},{"description":"Database to generate Figure 5","label":"Figure5_electoralcycles_2006-2012.tab","restricted":false,"version":2,"datasetVersionId":146088,"categories":["Data"],"dataFile":{"id":3300750,"persistentId":"doi:10.7910/DVN/VIXNNE/J4EAXV","pidURL":"https://doi.org/10.7910/DVN/VIXNNE/J4EAXV","filename":"Figure5_electoralcycles_2006-2012.tab","contentType":"text/tab-separated-values","friendlyType":"Tab-Delimited","filesize":1230,"description":"Database to generate Figure 5","categories":["Data"],"storageIdentifier":"s3://dvn-cloud:166d0676880-52af9008580f","originalFileFormat":"application/x-stata-14","originalFormatLabel":"Stata 14 Binary","originalFileSize":4763,"originalFileName":"Figure5_electoralcycles_2006-2012.dta","UNF":"UNF:6:lXGS2V/Lcc10cVC3jpNxcQ==","rootDataFileId":-1,"md5":"b42526590068a2a033b68918aedc12db","checksum":{"type":"MD5","value":"b42526590068a2a033b68918aedc12db"},"tabularData":true,"creationDate":"2018-11-01","publicationDate":"2019-06-18","fileAccessRequest":false}},{"description":"Do-file to generate graphs, based on the indicated .dta file","label":"Figures_HighProfileCriminalViolence.do","restricted":false,"version":1,"datasetVersionId":146088,"categories":["Code"],"dataFile":{"id":3300749,"persistentId":"doi:10.7910/DVN/VIXNNE/E6RCCO","pidURL":"https://doi.org/10.7910/DVN/VIXNNE/E6RCCO","filename":"Figures_HighProfileCriminalViolence.do","contentType":"application/x-stata-syntax","friendlyType":"Stata Syntax","filesize":2319,"description":"Do-file to generate graphs, based on the indicated .dta file","categories":["Code"],"storageIdentifier":"s3://dvn-cloud:166d066553a-1d8f4e8387ca","rootDataFileId":-1,"md5":"b6fe66e7efcdf0035a018817f242ae08","checksum":{"type":"MD5","value":"b6fe66e7efcdf0035a018817f242ae08"},"tabularData":false,"creationDate":"2018-11-01","publicationDate":"2019-06-18","fileAccessRequest":false}},{"description":"Please read before using data ","label":"ReadMe.pdf","restricted":false,"version":1,"datasetVersionId":146088,"categories":["Documentation"],"dataFile":{"id":3300746,"persistentId":"doi:10.7910/DVN/VIXNNE/MSRXJ7","pidURL":"https://doi.org/10.7910/DVN/VIXNNE/MSRXJ7","filename":"ReadMe.pdf","contentType":"application/pdf","friendlyType":"Adobe PDF","filesize":60805,"description":"Please read before using data ","categories":["Documentation"],"storageIdentifier":"s3://dvn-cloud:166d068c7da-03f822ff91c0","rootDataFileId":-1,"md5":"c03907490e44cdf4244195c752499f02","checksum":{"type":"MD5","value":"c03907490e44cdf4244195c752499f02"},"tabularData":false,"creationDate":"2018-11-01","publicationDate":"2019-06-18","fileAccessRequest":false}},{"description":"Do-file to generate Table 1 and run regression models (Tables 2-4 and Appendix Table)","label":"Tables_HighProfileCriminalViolence.do","restricted":false,"version":1,"datasetVersionId":146088,"categories":["Code"],"dataFile":{"id":3300745,"persistentId":"doi:10.7910/DVN/VIXNNE/DRM7O2","pidURL":"https://doi.org/10.7910/DVN/VIXNNE/DRM7O2","filename":"Tables_HighProfileCriminalViolence.do","contentType":"application/x-stata-syntax","friendlyType":"Stata Syntax","filesize":6424,"description":"Do-file to generate Table 1 and run regression models (Tables 2-4 and Appendix Table)","categories":["Code"],"storageIdentifier":"s3://dvn-cloud:166d064e942-e13b1c983754","rootDataFileId":-1,"md5":"3953c3e39be0da3e7f70f0f6536b6a1f","checksum":{"type":"MD5","value":"3953c3e39be0da3e7f70f0f6536b6a1f"},"tabularData":false,"creationDate":"2018-11-01","publicationDate":"2019-06-18","fileAccessRequest":false}}],"citation":"Trejo, Guillermo; Ley, Sandra, 2019, \"Replication Data for: High-Profile Criminal Violence. Why Drug Cartels Murder Government Officials and Party Candidates in Mexico\", https://doi.org/10.7910/DVN/VIXNNE, Harvard Dataverse, V1, UNF:6:BcqInKD9NBX3NkI48CdqpQ== [fileUNF]"}}