Skip to:

Information Technology

Recent Events

Records 24 / 28

Bits and pieces: Liberal democracy in the digital era

March 14, 2017

 The event is a joint sponsorship between CISAC, the Freeman Spogli Institute for International Studies, the European Security Initiative (in The Europe Center) and the Center for Russian, East...

The Challenges of Providing Data Security

January 18, 2017

  Video of Drell Lecture 2017, featuring Admiral Bob R.

CANCELLED -- The Great War of Our Time: The CIA's Fight Against Terrorism - From al Qa'ida to ISIS

November 17, 2015

DUE TO UNFORESEEN CIRCUMSTANCES, MICHAEL MORELL HAD TO CANCEL HIS VISIT.

Crowdsourced Democracy: Algorithms, Platforms, and Mechanisms

November 9, 2015

Abstract: While social media pervades many aspects of our lives, it has not yet proved to be an effective tool for large scale decision making: crowds of hundreds, perhaps millions, of individuals...

Earthquake Alert: Warning before shaking using smartphones

October 19, 2015

Abstract: Today, 100 people get an alert before earthquakes in California.  Recent legislation says everyone should get a warning.  In the future, your phone will detect earthquakes.  In the era of...

Can AI Make AI More Compliant (Semi-Automated Analysis - Ex Ante, In Situ, Ex Post)

October 12, 2015

Abstract: A number of senior Intelligence Community (IC) officials describe compliance as one of the IC’s biggest problems, perhaps the biggest.

Who Controls A Computer? A Predictive Theory of Comparative Strength in Computer Security Conflicts

April 27, 2015

Abstract: Any given computer or network runs code from an enormous number of sources, including the producer of the operating system, the hardware, built-in and user-installed applications,...

Bulk Collection of Signal Intelligence: Technical Alternatives

April 20, 2015

Abstract: The first Snowden disclosure was that Verizon was providing daily updates of telephony metadata to the NSA.

Modern Surveillance

March 19, 2015

Abstract: NSA stands for National Security Agency, but the agency is at odds with itself in its security mission.

Cybersecurity at the United Nations

January 22, 2015

Abstract: With the development of cyber capabilities by an increasing number of states, policymakers as well as scholars have been calling for the negotiation of a new international treaty to...

Round table with Internet Freedom Fellows

March 14, 2013

The Internet Freedom Fellows program brings human rights activists from across the globe to Geneva, Washington, and Silicon Valley to meet with fellow activists, U.S.

Away from the Keyboard? The Challenges of Command and Control over Cyber Operations

March 7, 2013

ABOUT THE TOPIC: Nearly all scholars writing about the potential for cyber war conclude that states, assumed to be unitary rational actors, are unlikely to use offensive cyber capabilities.

Can Information Security Survive?

June 11, 2012

Almost every company is asking the question of survivability – how to balance business needs and growth, while meeting regulatory compliance and mitigating security risks?

Some unexplored topics relating to cyber conflict

March 28, 2012

About the topic: This talk will present four important but largely unexplored topics in regarding conflict in cyberspace – two in some detail and two in a passing mention.

The Security Implications of Information Technology

May 6, 2010

AbstractInformation access and distribution is expanding exponentially.  Recent technological advancements have created a state of information openness where the general public has easy access both...

Got Twitter, Facebook, and YouTube? Mastering Social Networks for Academic Outreach

January 13, 2010

Margot Gerritsen is an Associate Professor in Energy Resources Engineering.

End of the World: Sense, Nonsense, and Nuclear War

May 21, 2009

Lynn Eden is acting co-director (2008-09) at the Center for International Security and Cooperation, Freeman Spogli Institute for International Studies, Stanford University.

Lasers, Bad; Landmines, Really Bad; Killer Robots, No Big Deal: Network Centrality, Agenda-Vetting, and the Paradox of Weapons Norms

April 2, 2009

Reading is available in the publications shelf (located on the left hand side of CISAC's main reception area) in a limited number of hard copies.

U.S. Intelligence Transformation: The Digital Dimension

December 5, 2007

James R. Gosler joined Sandia National Laboratories in 1979.

Sensors, Search and Seizure

March 13, 2007

A major component of the strategy to prevent attacks with Weapons of Mass Destruction (WMD) by transnational terrorist groups requires the widespread utilization of chemical, biological and...

Conventional and Dual Use Technology Export Control Legislation in the European Union and the United States: How Legislative Convergence Is Being Undermined by Administrative and Strategic Divergence

March 1, 2007

Noah Richmond (speaker) is a CISAC Zukerman Fellow and a Stanford Center on International Conflict and Negotiation fellow.

Homeland Security vs. the Madisonian Impulse: State Building and Anti-Statism After September 11

May 12, 2005

Has the Bush administration used the War on Terror to consolidate power in the executive branch?

People

Barbara van Schewick Associate Professor, Law
Herb Lin Herbert Lin Senior Research Scholar for Cyber Policy and Security
Timothy Junio Affiliate
Jackie Kerr Jaclyn A. Kerr Affiliate
Andreas Kuehn Andreas Kuehn Affiliate