Publications

Filter:

Filter results Close
  • expanded
  • expanded
  • expanded
  • expanded
  • expanded
  • expanded
  • expanded
  • expanded
Journal Article

Gregory Falco, Gregory Falco
2019

Abstract: Technical tools dominate the cyber risk management market. Social cybersecurity tools are severely underutilised in helping organisations defend themselves against cyberattacks. We investigate a class of non-technical risk mitigation strategies and tools that might be particularly effective in managing and mitigating the effects of certain cyberattacks. We call these social-science-grounded methods Defensive Social Engineering (DSE) tools.

Show body
Journal Article

Yogesh Joshi, Yogesh Joshi
Diplomacy and Statecraft, 2019

First proposed in 1964 by the Sri Lankan prime minister, the Indian Ocean Zone of Peace [IOZP] entailed eradication of foreign military bases from the Indian Ocean region as well its denuclearisation. During the Cold War, India was one of the most vehement supporters of IOZP. If some saw India’s interests in the IOZP as another manifestation of Nehruvian idealism, others viewed it as a part of its non-aligned foreign policy. This analysis argues otherwise.

Show body
Book

Herbert Lin, Herbert Lin, Amy Zegart
Brookings Institution Press, 2019

Offensive cyber operations have become increasingly important elements of U.S. national security policy. From the deployment of Stuxnet to disrupt Iranian centrifuges to the possible use of cyber methods against North Korean ballistic missile launches, the prominence of offensive cyber capabilities as instruments of national power continues to grow. Yet conceptual thinking lags behind the technical development of these new weapons. How might offensive cyber operations be used in coercion or conflict? What strategic considerations should guide their development and use?

Show body
Journal Article

François Diaz-Maurin, Rodney C. Ewing
MRS Advances, 2019

The “safety case” approach has been developed to address the issue of evaluating the performance of a geologic repository in the face of the large uncertainty that results for evaluations that extend over hundreds of thousands of years. This paper reviews the concept of the safety case as it has been defined by the international community. We contrast the safety case approach with that presently used in the U.S. repository program. Especially, we focus on the role of uncertainty quantification.

Show body
Journal Article

François Diaz-Maurin, Rodney C. Ewing
MRS Advances, 2018

The final disposal of nuclear waste is at the interface between the technologies of the nuclear fuel cycle that produce the waste and the natural hydrologic and geochemical cycles of geologic repositories. Despite this broad interdisciplinary scope, nuclear waste management, as practiced, remains “balkanized” among the relevant disciplines.

Show body
Journal Article

François Diaz-Maurin, François Diaz-Maurin, Rodney C. Ewing
Sustainability, 2018

Abstract: We present a new perspective on geological disposal systems for nuclear waste. Geological disposal systems encompass all the processes required for the permanent isolation of highly-radioactive materials from humans and the biosphere. Radioactive materials requiring geological disposal are created by commercial nuclear power plants, research reactors, and defense-related nuclear activities, such as spent nuclear fuel from commercial reactors and high-level waste from reprocessing to reclaim fissile material for weapons.

Show body
Journal Article

Yogesh Joshi,
2018

This article argues that China’s rise and its growing military power have intensified the Sino-Indian security dilemma. For a long time after the 1962 war, India’s military posture along the India–China border was mostly defensive in nature and could be characterized as imposing “deterrence by denial.” However, over the last decade, China’s growth trajectory coupled with rapid modernization of its military called into question the efficacy of this approach.

Show body
Journal Article

Asfandyar Mir,
International Security, 2018

For years, the U.S. government has been waging counterterrorism campaigns against al-Qaida and other armed groups in safe havens and weak states. What explains the effectiveness of such campaigns? The variation in effectiveness may result from differences in select tactical, organizational, and technological capabilities of the counterterrorism state and its local partner, captured by the concept of the Legibility and Speed-of-Exploitation System (L&S).

Show body
Journal Article

Scott Sagan, Benjamin Valentino
International Studies Quarterly, 2018

This article assesses American public attitudes toward the just war principles of proportionality, due care and distinction. Consistent with the logic of proportionality, the authors find that Americans are less willing to inflict collateral deaths on foreign civilians when the military advantage of destroying a target is lower. Most Americans also are willing to risk the deaths of American soldiers to avert a larger number of collateral foreign civilian deaths, which accords with the due care principle.

Show body
Book

Maxime Polleri,
2018

The maternal body is a site of contested dynamics of power, identity, experience, autonomy, occupation, and control.

Show body
Journal Article

François Diaz-Maurin, Zivayi Chiguvare, Gideon Gopee
Energy Policy, 2018

Abstract: The paper deals with the challenges of energy access, efficiency and security as essential conditions to improve people's living in the Southern African region. It supports energy policies by providing material for an integrated assessment of alternative energy systems at national level.

Show body
Journal Article

David Holloway, Yogesh Joshi, Malfrid Braut-Hegghammer
The International History Review, 2018
Show body
Journal Article

Max Smeets, Max Smeets
Strategic Studies Quarterly, 2018

Abstract: Could offensive cyber operations provide strategic value? If so, how and under what conditions? While a growing number of states are said to be interested in developing offensive cyber capabilities, there is a sense that state leaders and policy makers still do not have a strong conception of its strategic advantages and limitations. This article finds that offensive cyber operations could provide significant strategic value to state-actors. The availability of offensive cyber capabilities expands the options available to state leaders across a wide range of situations.

Show body
Journal Article

François Diaz-Maurin, François Diaz-Maurin
Bulletin of the Atomic Scientists , 2018

Abstrac: The failure of experts and lay people to understand each other has been fueling conflict around the environmental clean-up of the many sites in the United States that are contaminated by the nuclear weapons program. This mutual distrust was exacerbated by the culture of secrecy surrounding the atomic weapons program during World War II, and later by the innate culture of bureaucracy in the federal agencies that have sprung up since then.

Show body
Journal Article

François Diaz-Maurin, François Diaz-Maurin
Bulletin of the Atomic Scientists, 2018

Abstract: The failure of experts and lay people to understand each other has been fueling conflict around the environmental clean-up of the many sites in the United States that are contaminated by the nuclear weapons program. This mutual distrust was exacerbated by the culture of secrecy surrounding the atomic weapons program during World War II, and later by the innate culture of bureaucracy in the federal agencies that have sprung up since then.

Show body
Journal Article

Max Smeets, Max Smeets
Defence Studies, 2018

Across the world, states are establishing military cyber commands or similar units to develop offensive cyber capabilities.

Show body
Journal Article

Max Smeets, Max Smeets
Defence Studies, 2018

Abstract: Across the world, states are establishing military cyber commands or similar units to develop offensive cyber capabilities. One of the key dilemmas faced by these states is whether (and how) to integrate their intelligence and military capabilities to develop a meaningful offensive cyber capacity. This topic, however, has received little theoretical treatment. The purpose of this paper is therefore to address the following question: What are the benefits and risks of organizational integration of offensive cyber capabilities (OIOCC)?

Show body
Journal Article

Joseph Torigian
China Perspectives, 2018

Political scientists have found that early life experiences powerfully affect future leaders. Drawing on a variety of sources, this article investigates the formative role of Xi Jinping’s youth during a tumultuous time period in Chinese history. Xi’s life before and during the Cultural Revolution help explain his toughness, idealism, pragmatism, and caution. However, the evidence on how Xi’s childhood and young adulthood shaped his view on how to best handle political contradictions is ambiguous.

 

Show body
Journal Article

Rodney C. Ewing, Rodney C. Ewing
Environmental Science and Technology, 2018

Highly radioactive cesium-rich microparticles (CsMPs) were released from the Fukushima Daiichi nuclear power plant (FDNPP) to the surrounding environment at an early stage of the nuclear disaster in March of 2011; however, the quantity of released CsMPs remains undetermined.

Show body
Book

Amy Zegart, Amy Zegart, Condoleezza Rice, Condoleezza Rice
2018

From New York Times bestselling author and former U.S. secretary of state Condoleezza Rice and Stanford University professor Amy B. Zegart comes an examination of the rapidly evolving state of political risk, and how to navigate it.
The world is changing fast.

Show body
Journal Article

Amy Zegart, Amy Zegart
Journal of Strategic Studies, 2018

Drones are considered poor coercion tools: They cannot operate in contested airspace and they offer low-cost fights instead of more credible, costly signals. However, this article finds that technological advances will soon enable drones to function in hostile environments. Moreover, drones offer three unique coercion advantages that theorists did not foresee: sustainability in long duration conflicts, certainty of precision punishment which can change the psychology of adversaries, and changes in the relative costs of war.

Show body
Book

Harold Trinkunas, Vanda Felbab-Brown, Shadi Hamid
Brookings Institution Press, 2017

The sovereign state is frequently held up as the legitimate source of domestic order and an important provider of public goods in any society, regardless of regime type. But Hezbollah and the Islamic State in the Middle East, pirate clans in Africa, criminal gangs in South America, and militias in Southeast Asia are examples where nonstate actors have controlled local territory and have delivered public goods that the state cannot or will not provide. This book takes the reader to territories where state governance has broken down—or never really existed.

Show body
Journal Article

Aaron Clark-Ginsberg , Rebecca Slayton
Regulation & Governance, 2017

Complex industries such as petroleum production, civil aviation, and nuclear power produce “public risks” that are widely distributed and temporally remote, and thus tend to be ignored by the risk producers. Regulation is perhaps the most common policy tool for governing such risks, but requires expert knowledge that often resides solely within the industries. 

Show body
Journal Article

Megan Palmer, David Relman, Bruce C. Tiu, Amy S. Weissenbach
Health Security, 2017

The Johns Hopkins Center for Health Security has formulated an encompassing working definition of global catastrophic biological risks (GCBRs) that reflects diverse sources of risk and mechanisms of damage. The authors draw on their definition to highlight some important considerations for understanding and addressing GCBRs.

Show body

Pages