31 to 40 of 4,883 Results
Nov 13, 2023 -
Data for: Debating Algorithmic Fairness
Adobe PDF - 61.9 KB -
SHA512: a6f31e55fe877d5b368cd9111be4591b1a39b802757cd92c522c028be60926af4e68a1d82a0dd6ff58c5b8eb3fe2a379b059ab1545945c04e2699ded50f357c8
|
Nov 13, 2023 -
Data for: Debating Algorithmic Fairness
Adobe PDF - 523.8 KB -
SHA512: ea5ba9b2e3b5237921e5dbfbfc8ef913fd6b6839eba6c01ed6cb73243aa0c8a03d92305f427ebbc88b5fb117983146b3e9ebbf0449300e4412d728a5e8f7ffb8
|
Nov 13, 2023 -
Data for: Debating Algorithmic Fairness
Adobe PDF - 784.1 KB -
SHA512: 595b45df40a2df181d79d137e88a70a216ee4152b83dfd37da2249c50cee64bca3def5ed93291e67d4c25601ba78a9859e8ffac01ea71ed6984b6ef1eb84c5f4
|
Nov 13, 2023
Wedeen, Lisa. 2019. "Data for: Authoritarian apprehensions: Ideology, judgment, and mourning in Syria". Qualitative Data Repository. https://doi.org/10.5064/F63776W4. QDR Main Collection. V3
Project Summary In Authoritarian Apprehensions, Lisa Wedeen draws on her decades-long engagement with Syria to analyze the revolutionary exhilaration of the Syrian uprising’s initial days and then the devastating violence that shattered hopes of any quick undoing of dictatorship. Developing a theoretical approach within the frame of emerging forms...
|
Adobe PDF - 509.3 KB -
SHA512: 7c5c3bccfc905d186b97fed79a82e62db075dae4d9eefa13e832f094fc8981988f74a11cc4bd8f834605a0193a4ff2c9becc8811b840a1a29e4e1db886890a0a
|
Adobe PDF - 863.1 KB -
SHA512: 542fd088c174f9e9fbba5ea791546fe0656d4689613d7ce7338b8c1d5a50dbf8a0b271e43a780e73b2a542a71eee3829e4fc1c57269242be8a160d21ca55b3c2
|
Adobe PDF - 450.0 KB -
SHA512: 984b3d262770a5f93b232513c52e7e748342b0377bdc5a1b0833a17cc133ab8d3eb4d7eb3131a33fe7c4c345dabe30a209a1e827e8dd10c0dab5be0fc5fd20c8
|
Nov 1, 2023
Ivanov, Ivan Dinev. 2019. "Organizational Response to Emerging Threats: Lessons from NATO and the European Union’s Responses to Peacebuilding, Cyber Threats and Energy Security". Qualitative Data Repository. https://doi.org/10.5064/F61MNQL0. QDR Main Collection. V3
"Organizational Response to Emerging Threats" is a project that addresses three separate threat areas -- cybersecurity, peacekeeping and energy security. The data collection for cybersecurity and energy security has been completed. As of June 2019, the data collection for peacekeeping is ongoing. The project documents are organized around three top...
|
Adobe PDF - 183.3 KB -
SHA512: 8df1fa1274e99158a072f7471dc5c11ceddbfed1efa91ccb5ca8cfa5f9031ae849a1c23f2b9f71704a9e2f747702533953215d66f24373a6795e4eda633a58aa
|
Adobe PDF - 227.6 KB -
SHA512: 0d47971d8610ca499eeb196fa86e9659ed42ece2ea1542090de8ae61167aee45684935349360d1c3b46bb81feeee0361fad4b385e0673766dc0e2f611c20600b
|
- 2
- 3
- 4 (Current)
- 5
- 6