Coordination and security
暂无分享,去创建一个
[1] Jacob N. Shapiro. The Terrorist's Dilemma , 2013 .
[2] Raffaello Pantucci. The Terrorist's Dilemma: Managing Violent Covert Organizations , 2013 .
[3] Nils B. Weidmann,et al. Is the Phone Mightier Than the Sword? Cellphones and Insurgent Violence in Iraq , 2015, International Organization.
[4] M. Muckian. Structural Vulnerabilities of Networked Insurgencies: Adapting to the New Adversary , 2006, The US Army War College Quarterly: Parameters.
[5] Jacob N. Shapiro,et al. Can Hearts and Minds Be Bought? The Economics of Counterinsurgency in Iraq , 2008, Journal of Political Economy.
[6] R. Jensen. The Digital Provide: Information (Technology), Market Performance, and Welfare in the South Indian Fisheries Sector , 2007 .
[7] J. Aker. Information from Markets Near and Far: Information Technology, Search Costs and Grain Markets , 2009 .
[8] Erik Melander,et al. Introducing the UCDP Georeferenced Event Dataset , 2013 .
[9] K. Muralidharan,et al. The Political Economy of Public Sector Absence : Experimental Evidence from Pakistan ⇤ , 2014 .
[10] Clay Shirky. The political power of social media: Technology, the public sphere, and political change , 2011 .
[11] Jenny C. Aker,et al. Is Information Power? Using Mobile Phones and Free Newspapers during an Election in Mozambique , 2013, Review of Economics and Statistics.
[12] J. Aker. Information from Markets Near and Far: Mobile Phones and Agricultural Markets in Niger , 2010 .
[13] J. Kavanagh. Liberation technology , 1989 .
[14] Florian M. Hollenbach,et al. Technology and Collective Action: The Effect of Cell Phone Coverage on Political Violence in Africa , 2013, American Political Science Review.
[15] M. Callen,et al. Institutional Corruption and Election Fraud: Evidence from a Field Experiment in Afghanistan† , 2015 .
[16] R. Kelly Garrett,et al. Revolutionary Secrets: Technology’s Role in the South African Anti-Apartheid Movement , 2007 .
[17] Clay Shirky. The Political Power of Social Media , 2010 .