Академический Документы
Профессиональный Документы
Культура Документы
POL 346
Lectures: Monday and Wednesday 3:30-4:20pm (Jones 100)
Precepts: By assignment (Friend Center 005)
Course Description
This class is designed to introduce you to some of the most commonly used statistical
models for studying observational data. It is meant to build on the skills and knowledge
developed in an introductory statistics course such as POL 345, and is geared towards
those who wish their senior thesis to include a quantitative component. In addition to
presenting the linear model in the light of the likelihood framework, it also covers models for discrete data including binary, multinomial, ordered and count outcomes. The
course will also rely entirely on the R programming environment, a powerful and versatile open-source statistics suite. The course is therefore ideal for those who wish to
become thorough consumers and apt producers of professional empirical research.
Learning Objectives
By the end of this course, you should be able to:
Understand the issues involved in identifying causal relationships using observational data, and design a study with these issues in mind.
Identify widely used probability distributions, and understand the contexts in which
they should be used as models of how data are generated.
Estimate and assess parametric models for continuous, binary, multinomial, ordered and count outcome variables, and interpret results of these estimations using
both graphical and text-based tools.
Score
Grade
Score
Grade
Score
Grade
Score
Grade
94
90
87
A
AB+
83
80
77
B
BC+
73
70
60
C
CD
< 60
Class Policies
Late work and Incompletes
For all assignments, late submissions will not be accepted without prior permission. For
the final project, extensions can only be granted with explicit authorization from the students residential college dean or director of studies.
Attendance
You will not be graded directly on your attendance to either the lectures or the precept
sessions. However, I strongly suggest students expecting to receive an A in this course
attend all sessions.
Technology in the classroom
You will frequently make use of computers in this course, particularly during precepts.
Please be respectful to your instructor and your peers by using your computers only for
class-related purposes. Put your phone away before class starts and dont bring it out.
Students with disabilities
Students with disabilities enrolled in this course who may need disability-related classroom accommodations are encouraged to make an appointment to see me before the end
of the second week of the semester. All conversations will remain confidential. Please
also arrange to have the required documentation sent to me for any accommodations at
least two weeks prior to the rst exam.
Religious observances
Some students may wish to take part in religious observances that occur during this
semester. If you have a religious observance that conflicts with your participation in the
course, please meet with me before the end of the second week of the semester to discuss
appropriate accommodations.
Academic Integrity
Work on each take-home exam is strictly individual, and you must refrain from discussing any portion of your progress or proposed solution with your peers. While I
encourage you to work with others when completing your problem sets, I expect each
student to write and submit their own solutions for those as well. In both instances, you
are expected to write your own code. In general, well follow the guidelines used for
POL 345, which inherit from those used in computer science courses at Princeton.
Programming necessitates that you reach your own understanding of the problem
and discover a path to its solution. When completing problem sets, discussions with
other people (whether via the Internet or in person) are permitted and encouraged. However, when the time comes to write code that solves the problem set, and when giving
answers to problems in an exam, such discussions (except with course staff members)
are no longer appropriate: the code must be your own work. Do not, under any circumstances, copy another persons code, regardless of whether you are working on a
problem set or an exam. Incorporating someone elses code into your program in any
form is a violation of academic regulations. Abetting plagiarism or unauthorized collaboration by sharing your code is also prohibited. Sharing code in digital form is an
especially egregious violation: do not e-mail your code to anyone. Novices often have
the misconception that copying and mechanically transforming a program (by rearranging independent code, renaming variables, or similar operations) makes it something
different. Actually, identifying plagiarized source code is easier than you might think.
For example, there exists computer software that can detect plagiarism.
This policy supplements the Universitys academic regulations, making explicit what
constitutes a violation for this course. Princeton Rights, Rules, Responsibilities handbook
asserts:
The only adequate defense for a student accused of an academic violation is
that the work in question does not, in fact, constitute a violation. Neither the
defense that the student was ignorant of the regulations concerning academic
violations nor the defense that the student was under pressure at the time the
violation was committed is considered an adequate defense.
I encourage you to read the Universitys Academic Integrity policy, available here. If you
have any questions about these matters, please consult a course staff member.
Topic
Intro
A framework for model design
Design & Identification
Assignments
10-Feb
15-Feb
17-Feb
22-Feb
PS1 out
24-Feb
LM diagnostics
Readings
Date
29-Feb
2-Mar
7-Mar
9-Mar
21-Mar
23-Mar
28-Mar
30-Mar
4-Apr
6-Apr
11-Apr
13-Apr
18-Apr
20-Apr
25-Apr
27-Apr
Readings