To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Analyzing data requires more than simply running one model and reporting the results. Getting trustworthy results requires careful checking of the data, including checking for and addressing missing values, nonlinearities, and collinearity, and generating any necessary composite or recoded variables such as interaction terms, scales or indices, or even lagged variables. Finally, problems occur when messy real-world data meet assumption-laden models. Endogeneity, simultaneity, omitted variable bias, fixed effects, and dichotomous DVs all violate key assumptions of the OLS model and require appropriate statistical and/or theoretical adjustments to produce trustworthy results.
A framing case study describes Russia’s 2022 invasion of Ukraine. Then the chapter provides an overview of law on the use of force. The chapter begins by describing the historical movement to prohibit the use of force. It then discusses the use of force with UN Security Council authorization. Next, it examines the complex topic of self-defense, including how states can respond to armed attacks, whether they can prevent armed attacks, and how they can protect themselves against non-state actors. Finally, the chapter probes whether the use of force is ever legally justified for other reasons, including: protecting nationals abroad; humanitarian intervention and the responsibility to protect; and when states consent to intervention.
A framing case study describes the trial of Hissène Habré, the deposed leader of Chad who was prosecuted for multiple international crimes in Senegal. The chapter then discusses international criminal law. The chapter first discusses major principles of international criminal law and its evolution. It next discusses the key elements for establishing criminal guilt, including: the definition of core crimes; modes of responsibility and liability; and possible defences. Finally, the chapter surveys the major institutions that enforce international criminal law by discussing the operations of the International Criminal Court and the assertion of universal jurisdiction by domestic courts.
Write regularly and pay attention to your personal writing processes. When it’s writing time, it’s writing time. Save the self-editing for later. Choose a self-editing strategy that targets the kinds of writing problems you know you usually have: surface, sentence, paragraph, or global level. Don’t be afraid to change strategies or try multiple strategies; taking more looks at your paper is always better. Peer review as it’s practiced in political science is about reviewing research design and execution, not line editing. For all papers, look for theory grounded in concepts, hypotheses that are directly observable implications of the theory, and measurement that is valid in the context of the research. For qualitative research, consider case selection, measurement, and whether the conclusions are commensurate with the scope of the theory and tests. For quantitative research, consider issues of measurement and case selection, and be alert for specification errors and analytical pitfalls the author might have missed. Helpful peer reviews provide concrete guidance about weaknesses in the paper and often include specific suggestions or requests for additional development of the paper.
This chapter explores the fundamentals of data in data science, covering data types (structured vs. unstructured), collection sources (open data, social media APIs, multimodal data, synthetic data), and storage formats (CSV, TSV, XML, RSS, JSON). It emphasizes the critical importance of data pre-processing, including data cleaning (handling missing values, smoothing noisy data, data munging), integration, transformation, reduction, and discretization. Through hands-on examples, the chapter demonstrates how to systematically prepare "dirty" real-world data for analysis by addressing inconsistencies, outliers, and missing information. The chapter highlights that data preparation is often half the battle in data science, requiring both technical skills and careful attention to data quality and bias.
This chapter introduces machine learning as a subset of artificial intelligence that enables computers to learn from data without explicit programming. It defines machine learning using Tom Mitchell’s formal framework and explores practical applications like self-driving cars, optical character recognition, and recommendation systems. The chapter focuses on regression as a fundamental machine learning technique, explaining linear regression for modeling relationships between variables. A key section covers gradient descent, an optimization algorithm that iteratively finds the best model parameters by minimizing error functions. Through hands-on Python examples, students learn to implement both linear regression and gradient descent algorithms, visualizing how models improve over iterations. The chapter emphasizes practical considerations for choosing appropriate algorithms, including accuracy, training time, linearity assumptions, and the number of parameters, preparing students for more advanced supervised and unsupervised learning techniques.