Is There a Secret Ballot? Ballot Secrecy Perceptions and Their Implications for Voting Behaviour

ISPS Data Archive: Terms of Use

By using, contributing, and/or downloading files associated with scholarly studies available on the ISPS Data Archive, you agree to these terms and conditions. Please read the ISPS Data Archive Terms of Use.

Suggested citation: 

Alan S. Gerber, Gregory A. Huber, David Doherty and Conor M. Dowling (2012), Replication Materials for ‘Is There a Secret Ballot? Ballot Secrecy Perceptions and Their Implications for Voting Behaviour,’ ISPS Data Archive.


David Doherty, Gregory Huber, Alan S. Gerber, Conor M. Dowling

Research design: 
Data type: 
Data source(s): 

Authors; 2008 Cooperative Congressional Election Study (CCES)

Data source information: 


Field date: 
October 1, 2008
Field Date: 
Location details: 
Unit of observation: 
Sample size: 
The survey sample we use was constructed by first drawing a target population sample of 1,800 individuals. This sample is based on the 2005–06 American Community Study, November 2008 Current Population Survey, and the 2007 Pew Religious Life Survey... Polimetrix invited a sample of their opt-in panel of 1.4 million survey respondents to participate in the study. Invitations were stratified based on age, race, gender, education and by simple random sampling within strata. Half of the 2,494 respondents who completed our module (1,247 individuals) were randomly assigned to complete the questions about ballot secrecy that we use here. A subset of the 2,494 respondents were matched to the target sample of 1,800 cases based on gender, age, race, region, metropolitan statistical area, education, news interest, marital status, party identification, ideology, religious affiliation, frequency of religious services attendance, income and voter registration status. Approximately 70 per cent (893) of the respondents who completed the secret ballot items were matched to cases in the target sample. Of these, 804 respondents provided responses to all of the items we use in our analysis and, thus, are included in our sample.
Randomization procedure: 
Treatment administration: 
Outcome measures: 
Vote choice
Archive date: 
Owner contact: 


Terms of use: 

ISPS Data Archive: Terms of Use.

Data file numbersort descending Description File format Size File url
D088F01 ReadMe .pdf 32768 Download file
D088F02 Data File - CCAP2008 .dta 5190656 Download file
D088F03 Data File - CCES2008 .dta 3709952 Download file
D088F04 Data File - CCAP2008 .csv 2275328 Download file
D088F05 Data File - CCES2008 .csv 1789952 Download file
D088F08 Program file - generate data files .do 2048 Download file
D088F09 Program file - replication1 .do 27648 Download file
D088F10 Program file - replication2 .do 6144 Download file
D088F12 Program file - replication1 .R 28672 Download file
D088F13 Program file - replication2 .R 5120 Download file
D088F15 Output - robustness post .out 2048 Download file
D088F16 Output - robustness predictive .out 5120 Download file
D088F17 Output - Table02 .out 7168 Download file
D088F18 Output - Table03 .out 2048 Download file
D088F19 Output - TableA04 .out 7168 Download file
D088F20 Supplementary Materials - Appendix .pdf 361472 Download file
D088F21 Supplmenetary Materials - TableA03 .csv 15360 Download file
D088F22 Supplmenetary Materials - unreported margins .csv 6144 Download file
D088F23 Metadata (DDI 3.2) .xml 10763134 Download file