Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

STATA analysis

simple task in stata anaysis 

Homework 5: Non-Linear Regression

(Due: 8:50am CST, Nov 29, 2024)

Let’s suppose you are interested in how life satisfaction is associated with internet use, age, gender, and marital status (i.e., married vs. non-married) for older adults (or how older adults’ internet use, age, gender, and marital status influence life satisfaction).

You set up your research question in the following model:

(Eq. 1)

To examine your research question empirically, you figured out that the Health and Retirement Study (HRS) is the secondary data that best suits your goal. Thus, you want to work with 2018 HRS core data.

        
1. Please go to the following web: 
        
2. Download the relevant files (e.g., h18sta.zip files… ).
        
3. In 
            Section LB: Leave Behind Questionnaires (Respondent), you want to take the information about life satisfaction. Use the relevant dta file and keep only three variables: 
            hhid, pn, and QLB002C. 
        
        
        
HHID         HOUSEHOLD IDENTIFICATION NUMBER
Section: LB  Level: Respondent      Type: Character  Width: 6   Decimals: 0
        
...........................................................................
  17146           010003-959738. Household Identification Number
        
            
        


        
PN           RESPONDENT PERSON IDENTIFICATION NUMBER
Section: LB  Level: Respondent      Type: Character  Width: 3   Decimals: 0


        
...........................................................................
          9738         010. Person Identifier
           654         011. Person Identifier
            32         012. Person Identifier
             1         013. Person Identifier
          5480         020. Person Identifier
           180         021. Person Identifier
            21         022. Person Identifier
             1         023. Person Identifier
           353         030. Person Identifier
            44         031. Person Identifier
             3         032. Person Identifier
             1         033. Person Identifier
           586         040. Person Identifier
            47         041. Person Identifier
             4         042. Person Identifier
             1         043. Person Identifier


        

        
QLB002C                       Q02C. SATISFIED WITH LIFE
Section: LB  Level: Respondent      Type: Numeric    Width: 1   Decimals: 0
Please say how much you agree or disagree with the following statements. (Mark (X) one box for each line.)
         
         I am satisfied with my life.


        
   ....................................................................
           262           1. STRONGLY DISAGREE
           323           2. SOMEWHAT DISAGREE
           348           3. SLIGHTLY DISAGREE
           362           4. NEITHER AGREE OR DISAGREE
           734           5. SLIGHTLY AGREE
          1841           6. SOMEWHAT AGREE
          1774           7. STRONGLY AGREE
         11502       Blank. INAP (Inapplicable); Partial Interview

4. Rename the variable QLB002C to life_sat.

5. Drop individuals who reported the missing (.) in life_sat variable.

6. Label the values of life_sat variable

1. STRONGLY DISAGREE
   2. SOMEWHAT DISAGREE
   3. SLIGHTLY DISAGREE
   4. NEITHER AGREE OR DISAGREE
   5. SLIGHTLY AGREE
   6. SOMEWHAT AGREE
   7. STRONGLY AGREE

7. Save the data, temp_lb_2018.dta.

8. In 
            Section W: Event History, Internet Use and Social Security (Respondent), you want to take the information about internet use. Use the relevant dta file and keep only three variables: 
            hhid, pn, and QW303.
        


        
HHID         HOUSEHOLD IDENTIFICATION NUMBER
Section: W   Level: Respondent      Type: Character  Width: 6   Decimals: 0


        
 .........................................................................
         17146           010003-959738. Household Identification Number


        
        
==========================================================================
            
        


        
PN           RESPONDENT PERSON IDENTIFICATION NUMBER
Section: W   Level: Respondent      Type: Character  Width: 3   Decimals: 0


        
...........................................................................
          9738         010. Person Identifier
           654         011. Person Identifier
            32         012. Person Identifier
             1         013. Person Identifier
          5480         020. Person Identifier
           180         021. Person Identifier
            21         022. Person Identifier
             1         023. Person Identifier
           353         030. Person Identifier
            44         031. Person Identifier
             3         032. Person Identifier
             1         033. Person Identifier
           586         040. Person Identifier
            47         041. Person Identifier
             4         042. Person Identifier
             1         043. Person Identifier


        
QW303        REGULAR USE OF WEB FOR EMAIL
Section: W   Level: Respondent      Type: Numeric    Width: 2   Decimals: 0
         Ref: EventHistory.W303_


        
Do you regularly use the Internet (or the World Wide Web) for sending and receiving e-mail or for any other purpose, such as making purchases, searching for information, or making travel reservations?
         User Note:  Interviewer-administered item.


        
...........................................................................
            14          -8. Web non-response
         10068           1. YES
          6911           5. NO
             9           8. DK (Don’t Know); NA (Not Ascertained)
            22           9. RF (Refused)
           122       Blank. INAP (Inapplicable); Partial Interview


        

9. Rename the variable QW303 to internet_use.

10. Drop individuals who reported the values -8, 8, and 9 of the “internet_use.”

11. Replace the value 5 (NO) with 0.

12. Save the data, temp_w_2018.dta.

13. Merge two data files, temp_lb_2018.dta and temp_w_2018.dta.

14. Keep individuals that are exactly matched (i.e., Keep individuals shown both in the master and using data).

15. Save the merged data, temp_merged_lb_w_2018.dta.

16. Please download the h18_trk.dta from Canvas and keep the variables: hhid, pn, qage, gender, and qmarst.

        
HHID         HOUSEHOLD IDENTIFICATION NUMBER
Section: W   Level: Respondent      Type: Character  Width: 6   Decimals: 0
        
                010003-959738. Household Identification Number
        
===========================================================================
        
PN           RESPONDENT PERSON IDENTIFICATION NUMBER
Section: W   Level: Respondent      Type: Character  Width: 3   Decimals: 0
        
        
QAGE                     AGE AT 2018 INTERVIEW
         Section: TR    Level: Respondent      Type: Numeric    Width: 3   Decimals: 0

999: Not applicable

GENDER           GENDER
Section: TR  Level: Respondent      Type: Numeric    Width: 1   Decimals: 0
        
...........................................................................
         19180           1.  Male
         24234           2.  Female
           144       Blank.  Unknown
        
        
QMARST       2018 MARITAL STATUS
Section: TR  Level: Respondent      Type: Numeric    Width: 1   Decimals: 0
        
This variable may not be completely consistent with core data. Corrections have been made to this variable based on cross-wave information. See Section 5B1 in the tracker data description for more information.
        
...........................................................................
          9758           1.  Married
          3625           2.  Separated/Divorced
          3024           3.  Widowed
          1343           4.  Never Married
           260           5.  Marital Status Unknown
         25548       Blank.  No core interview from household, or not in sample this wave

17. Rename the variable qage to age.

18. Drop individuals who reported 999 in the age variable.

19. Drop individuals who reported missing (.) in the gender variable.

20. Rename the variable qmarst to marital_st.

21. Drop individuals who reported 5 or missing (.) in the marital_st variable.

22. Generate an indicator variable for married (i.e., i_married) and code 1 if individuals reported 1 in the marital_st variable and 0 if individuals reported 2, 3, or 4 in the marital_st variable.

23. Save the data, temp_trk_2018.dta.

24. Merge two data files, temp_trk_2018.dta and temp_merged_lb_w_2018.dta.

25. Keep individuals that are exactly matched (i.e., Keep individuals shown both in the master and using data).

This time, instead of using the OLS method, you want to use
non-linear regression models.

26. Run the ordered probit regression to estimate (Eq. 1) above.

27. Interpret your estimate for internet_use.

28. Run the ordered logit regression to estimate (Eq. 1) above, and get the estimates of odds ratio (i.e., use the “or” option in the ologit command).

29. Interpret your estimate for internet_use.

30. Your null hypothesis: Gender does not affect life satisfaction. Based on your ordered logit estimate for gender in Q28, test your hypothesis
using the 95% confidence interval.

31. Visualize the conditional predicted probability of each response category (1. SDA, … 7. SA) for individuals who are female and aged between 20-80.

Submit your 1) do file and 2) MS Word document.

4

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Computer Science WK3 Assignment

Please see attachment for instructions ISSC680 Week 3 Homework Assignment Instructions: Please provide a one-page response to the following topic utilizing supporting documentation obtained from the attach books and the Internet. APA format and reference. Topic: Differentiate between the different types of cryptographic algorithms.

Discussion and Replies

Please see attachment for instructions     Discussion   In 250 words total, answer the questions below with 4 evidence base scholarly articles. APA format. Based on this weeks readings, 1. Discuss some effective strategies for Security Awareness in your organization or 2. What you would like to see implemented

What Does Custom Software Development Cost in the USA?

  The cost of custom software development in the USA typically ranges from $25,000 to $500,000 or more, depending on the complexity, features, and scale of the project. Here’s a quick breakdown: Small projects (like MVPs or simple web/mobile apps): $25,000 – $50,000   Mid-sized solutions (custom dashboards, automation, integrations):

PAP: Gather Product Information

 The Rest of the resources and instructions are provided in the screenshots below. You will need the Project overview to complete this assignment. Project Overview This project includes the following tasks: Gather product information Analyze and differentiate product vulnerabilities Recommendation based on empirical data collection Objective: Product Selection Recommendation Organizations

The Future of E-Prescriptions: Why Surescripts Integration is a Must-Have

 How Does Surescripts Integration Improve Prescription Management?  The Future of E-Prescriptions: Why Surescripts Integration is a Must-Have In today’s fast-evolving healthcare landscape, seamless data exchange is essential for improving patient care and optimizing workflows. Surescripts integration solutions provide a secure and efficient way to connect pharmacies, healthcare providers, and electronic

Explore Azure

Project 1 – Explore Microsoft Azure Final Report Template Executive Summary (<1 page) Explore services and offerings of Microsoft Azure cloud (2 pages) Provision Provision and Prepare Web Server Virtual Machine (2–3 pages) Create Azure VM Scale Set with Load Balancer lab (2-3 pages ) Deploy Azure PaaS Web Application

Unit V Fin Mgt

see attachment Break-Even Analysis You want to update your car with a navigation system. Adding this feature requires a flat fee of $500, and the service provider requires monthly charges of $20. In your business, as the owner, you estimate that this device can save time and money, about $35

Computer Science Wk 2 assignment

Please see attachment for instructions provide a one-page response to the following topic below utilizing supporting documentation obtained from your textbooks and the Internet.  Be sure to include an APA Reference Page Topic: Assess the various Access Control methods.

Discussion and Replies

Please see attachment for instructions.       In 250 words total, answer the questions below with 4 evidence base scholarly articles. APA format. Based on the readings for chapter 3 Information Security Fundamentals and chapter 3&4 Information Security: Design, Implementation, Measurement, and Compliance, Discuss the following. 1. What are

How can businesses benefit from incorporating AI Integration Services into their digital transformation strategies?

[url= Integration Services[/url] are transforming businesses by streamlining operations, enhancing customer experiences, and enabling data-driven decisions. By automating repetitive tasks, AI frees up resources for more strategic activities, improving productivity. AI tools like chatbots and recommendation engines offer personalized solutions, fostering customer loyalty. AI also helps businesses analyze large datasets

OSINT Project 2

 Download the attached detailed assignment description for this project. You should also review the rubric shown below for additional information about the requirements for the project and how your work will be graded. Please make sure that you use both the assignment description file AND the rubric when completing your work. 

OSINT Project

Instructions Download the attached detailed assignment description for this project. You should also review the rubric shown below for additional information about the requirements for the project and how your work will be graded. Please make sure that you use both the assignment description file AND the rubric when completing your

D 6 of 459

Follow the attach instructions to complete this work Questions: 1. How is technology increasingly used in healthcare beyond electronic health records (HER)?  Give some examples. 2. Would you personally participate in robot assisted/telesurgery as a patient or a medical professional?  Why or why not? Resources 20 Examples Of IoT Wearables

D 5 of 459

Follow the attach instructions to complete the work. Questions: 1. What are service robots and how are they used and categorized?  Give examples of each. 2. How would you leverage service robots to improve the availability, confidentiality, and integrity of a large (20MW+) data center? Resources Robots as a Platform

ITS 10 Help

Ethical Hacking help Login to your NDG Online account. Complete the following labs. Each lab is worth 40 points. NDG Online account Link- Log In | NDG Online Portal ([email protected] Password: Starballplayer23$ 1. NDG Ethical Hacking Lab 10: Web Pentesting 2. NDG Ethical Hacking Lab 11: Client Side Exploitations After

InfSec

 Blockchain technology will revolutionize cybersecurity

ITS 12 Help

Ethical HAcking Login to your NDG Online account. Complete the following labs. Each lab is worth 40 points. NDG Online account Link- Log In | NDG Online Portal ([email protected] Password: Starballplayer23$ 1. NDG Ethical Hacking Lab 08: Password Cracking with JTR and Hashcat 2. NDG Ethical Hacking Lab 17: Creating

ITS 13 Help

Ethical Hacking  Login to your NDG Online account. Complete the following labs. Each lab is worth 40 points. NDG Online account Link- Log In | NDG Online Portal ([email protected] Password: Starballplayer23$ 1. NDG Ethical Hacking Lab 06: Network Analysis 2. NDG Ethical Hacking Lab 07: Evading IDS Submit Your Lab