Publications

Filter:

Filter results Close
  • expanded
  • expanded
  • expanded
  • expanded
  • expanded
  • expanded
  • expanded
  • expanded
Journal Article

Rodney C. Ewing, Rodney C. Ewing
Science of The Total Environment, 2020

A new study reveals particles that were released from nuclear plants damaged in the devastating 2011 Tohoku earthquake and tsunami contained small amounts of radioactive plutonium.

View full article

Show body
Commentary

Anja Manuel, Anja Manuel, Kathleen Hicks
2020

As the Chinese government has set out to harness the growing strength of the Chinese technology sector to bolster its military, policymakers in the United States have reacted with mounting alarm. U.S.

Show body
Commentary

Benoît Pelopidas, Stephen Herzog, Fabrício Fialho
2020

Polls in the United States and nine allied countries in Europe and Asia show that public support for a nuclear test is very low. If the Trump administration conducts a test, then it shouldn’t expect backing from Americans or its closest U.S. partners.

Read more at The National Interest

Show body
Commentary

Anja Manuel, Anja Manuel
2020

A new shadow war is underway within the International Telecommunication Union, one of the obscure organizations that sets global technical standards.

International standard-setting is a morass of positive intentions and poor execution. When the process works well, it selects the best technologies based on merit and, for example, allows people to use their personal cellphone numbers anywhere on Earth. When the system fails, we end up with different electrical outlets in each country and scramble for adapters.

Show body
Commentary

Anja Manuel, Anja Manuel, Stephen J. Hadley
2020

“Build back better” was the mantra New Orleans adopted after the devastation of Hurricane Katrina. It should be our country’s motto as we work to recover from the economic and public health crises caused by covid-19.

Read more at The Washington Post

Show body
Working Paper

Gregory Falco, Martin Eling, Danielle Jablanski, Virginia Miller, Lawrence A. Gordon, Shaun Shuxun Wang, Joan Schmit, Russell Thomas, Mauro Elvedi, Thomas Maillart, Emy Donavan, Simon Dejung, Matthias Weber, Eric Durand, Franklin Nutter, Uzi Scheffer, Gil Arazi, Gilbert Ohana, Herbert Lin
The 2019 Workshop on the Economics of Information Security (WEIS), 2020

A Research Agenda for Cyber Risk and Cyber Insurance

By: Gregory Falco, Stanford University

Martin Eling, University of St. Gallen

Danielle Jablanski, Stanford University

Virginia Miller, Stanford University

Lawrence A. Gordon, University of Maryland

Shaun Shuxun Wang, Nanyang Technological University

Joan Schmit, University of Wisconsin-Madison

Russell Thomas, RMS and George Mason University

Show body
Journal Article

Gregory Falco, Martin Eling, Danielle Jablanski, Matthias Weber, Virginia Miller, Lawrence A. Gordon, Shaun Shuxun Wang, Joan Schmit, Russell Thomas, Mauro Elvedi, Thomas Maillart, Emy Donavan, Simon Dejung, Eric Durand, Franklin Nutter, Uzi Scheffer, Gil Arazi, Gilbert Ohana, Herbert Lin
Science, 2019
Show body
Commentary

Anja Manuel, Anja Manuel
2019

Silicon Valley is belatedly waking up to the fact that China systematically extracts the most advanced technology from the west, using both legal and nefarious means.

Read more at The Financial Times

Show body
Book

Jeffrey Knopf, Jeffrey Knopf, Anne I. Harrington
Athens : The University of Georgia Press, [2019], 2019

Recent discoveries in psychology and neuroscience have improved our understanding of why our decision making processes fail to match standard social science assumptions about rationality.

Show body
Commentary

Amy Zegart
Foreign Affairs, 2019

At the end of July, Dan Coats, the U.S. director of national intelligence (DNI), announced his resignation. When he leaves office on August 15, the U.S. intelligence community will be left with two crises to confront. One is obvious and immediate: how to protect the objectivity and professionalism of the intelligence agencies against the rising tide of politicization by the White House.

Show body
Journal Article

Herbert Lin, Herbert Lin
Bulletin of the Atomic Scientists, 2019

Corruption of the information ecosystem is not just a multiplier of two long-acknowledged existential threats to the future of humanity—climate change and nuclear weapons. Cyber-enabled information warfare has also become an existential threat in its own right, its increased use posing the realistic possibility of a global information dystopia, in which the pillars of modern democratic self-government—logic, truth, and reality—are shattered, and anti-Enlightenment values undermine civilization around the world. 

 

Show body
Journal Article

David M. Klaus,
Bulletin of the Atomic Scientists , 2019

Within a 10-day period in February 2014, two accidents happened at the

Show body
Commentary

Amy Zegart, Michael Morell, Michael Morell
Foreign Affairs, 2019

For U.S. intelligence agencies, the twenty-first century began with a shock, when 19 al Qaeda operatives hijacked four planes and perpetrated the deadliest attack ever on U.S. soil. In the wake of the attack, the intelligence community mobilized with one overriding goal: preventing another 9/11. The CIA, the National Security Agency, and the 15 other components of the U.S. intelligence community restructured, reformed, and retooled. Congress appropriated billions of dollars to support the transformation.

Show body
Journal Article

Rob Blair,
International Organization, 2019

What are the effects of international intervention on the rule of law after civil war? Rule of law requires not only that state authorities abide by legal limits on their power, but also that citizens rely on state laws and institutions to adjudicate disputes.

Show body
Journal Article

Herbert Lin, Herbert Lin
I/S: A Journal of Law and Policy for the Information Society, 2019
Show body
Journal Article

Gregory Falco
2019

Abstract: Technical tools dominate the cyber risk management market. Social cybersecurity tools are severely underutilised in helping organisations defend themselves against cyberattacks. We investigate a class of non-technical risk mitigation strategies and tools that might be particularly effective in managing and mitigating the effects of certain cyberattacks. We call these social-science-grounded methods Defensive Social Engineering (DSE) tools.

Show body
Book

Martha Crenshaw, Martha Crenshaw
Oxford University Press, 2019

Abstract: This chapter reviews the evolution of Martha Crenshaw’s interests in and approaches to researching terrorism, a trajectory that begins in the 1960s and extends to the present. The story is necessarily partial and incomplete as well as personal. Her first research project concentrated on the use of terrorism by the FLN during the Algerian War, and her current research deals with patterns of cooperation and competition among militant groups and with the relationship between jihadist-oriented transnational terrorism and civil war.

Show body
Journal Article

Yogesh Joshi, Yogesh Joshi
Diplomacy and Statecraft, 2019

First proposed in 1964 by the Sri Lankan prime minister, the Indian Ocean Zone of Peace [IOZP] entailed eradication of foreign military bases from the Indian Ocean region as well its denuclearisation. During the Cold War, India was one of the most vehement supporters of IOZP. If some saw India’s interests in the IOZP as another manifestation of Nehruvian idealism, others viewed it as a part of its non-aligned foreign policy. This analysis argues otherwise.

Show body
Book

Herbert Lin, Herbert Lin, Amy Zegart
Brookings Institution Press, 2019

Offensive cyber operations have become increasingly important elements of U.S. national security policy. From the deployment of Stuxnet to disrupt Iranian centrifuges to the possible use of cyber methods against North Korean ballistic missile launches, the prominence of offensive cyber capabilities as instruments of national power continues to grow. Yet conceptual thinking lags behind the technical development of these new weapons. How might offensive cyber operations be used in coercion or conflict? What strategic considerations should guide their development and use?

Show body
Journal Article

François Diaz-Maurin, Rodney C. Ewing
MRS Advances, 2019

The “safety case” approach has been developed to address the issue of evaluating the performance of a geologic repository in the face of the large uncertainty that results for evaluations that extend over hundreds of thousands of years. This paper reviews the concept of the safety case as it has been defined by the international community. We contrast the safety case approach with that presently used in the U.S. repository program. Especially, we focus on the role of uncertainty quantification.

Show body
Journal Article

François Diaz-Maurin, Rodney C. Ewing
MRS Advances, 2018

The final disposal of nuclear waste is at the interface between the technologies of the nuclear fuel cycle that produce the waste and the natural hydrologic and geochemical cycles of geologic repositories. Despite this broad interdisciplinary scope, nuclear waste management, as practiced, remains “balkanized” among the relevant disciplines.

Show body
Policy Brief

Megan Palmer, Megan Palmer, David Relman
2018

This study’s purpose was to highlight the changing safety and security landscape engendered by the emergence of new genome editing technologies, help policy-makers and other stakeholders navigate this space, and illuminate broader trends in the life sciences that may impact the biosecurity landscape.

Show body
Policy Brief

Rodney C. Ewing,
2018

The U.S. government has worked for decades and spent tens of billions of dollars in search of a permanent resting place for the Nation’s nuclear waste. Some 80,000 tons of highly radioactive spent fuel from commercial nuclear power plants and millions of gallons of high-level nuclear waste from defense programs are stored in pools, dry casks and large tanks throughout the country at more than 75 sites in 39 states.

Show body

Pages