Institutions and Organizations

Recent Publications

Records 48 / 986

Cyber negotiation: a cyber risk management approach to defend urban critical infrastructure from cyberattacks

March 2019

Abstract: Technical tools dominate the cyber risk management market. Social cybersecurity tools are severely underutilised in helping organisations defend themselves against cyberattacks.

Constructing the Field of Terrorism

March 2019

Abstract: This chapter reviews the evolution of Martha Crenshaw’s interests in and approaches to researching terrorism, a trajectory that begins in the 1960s and extends to the present.

Whither Non-Alignment? Indian Ocean Zone of Peace and New Delhi’s Selective Alignment with Great Powers during the Cold War, 1964–1979

February 2019

First proposed in 1964 by the Sri Lankan prime minister, the Indian Ocean Zone of Peace [IOZP] entailed eradication of foreign military bases from the Indian Ocean region as well its...

Noncitizen Soldiers: Explaining Foreign Recruitment by Modern State Militaries

January 2019

More than a century after citizen armies became an international norm, nearly two dozen states actively recruit foreigners into their militaries.

Bytes, Bombs, and Spies - The Strategic Dimensions of Offensive Cyber Operations

January 2019

Offensive cyber operations have become increasingly important elements of U.S. national security policy.

Probabilistic Performance Assessment vs. the Safety Case Approach

January 2019

The “safety case” approach has been developed to address the issue of evaluating the performance of a geologic repository in the face of the large uncertainty that results for evaluations that...

Evolution and Structure of the Scientific Basis for Nuclear Waste Management

December 2018

The final disposal of nuclear waste is at the interface between the technologies of the nuclear fuel cycle that produce the waste and the natural hydrologic and geochemical cycles of geologic...

Editing Biosecurity: Needs and Strategies for Governing Genome Editing

December 2018

This study’s purpose was to highlight the changing safety and security landscape engendered by the emergence of new genome editing technologies, help policy-makers and other stakeholders navigate...

Reset of America’s Nuclear Waste Management Strategy and Policies

December 2018

The U.S. government has worked for decades and spent tens of billions of dollars in search of a permanent resting place for the Nation’s nuclear waste.

George Washington Was a Master of Deception

November 2018

Abstract: The Founding Fathers relied on deceit in championing American independence—and that has lessons for the present.

Mission Impossible? Socio-technical Integration of Nuclear Waste Geological Disposal Systems

November 2018

Abstract: We present a new perspective on geological disposal systems for nuclear waste.

From Denial to Punishment: The Security Dilemma and Changes in India’s Military Strategy towards China

November 2018

This article argues that China’s rise and its growing military power have intensified the Sino-Indian security dilemma.

What Explains Counterterrorism Effectiveness? Evidence from the U.S. Drone War in Pakistan

November 2018

Abstract For years, the U.S. government has been waging counterterrorism campaigns against al-Qaida and other armed groups in safe havens and weak states.

What Explains Counterterrorism Effectiveness? Evidence from the U.S. Drone War in Pakistan

November 2018

For years, the U.S. government has been waging counterterrorism campaigns against al-Qaida and other armed groups in safe havens and weak states.

Not Just a War Theory: American Public Opinion on Ethics in Combat

October 2018

This article assesses American public attitudes toward the just war principles of proportionality, due care and distinction.

Bearing the Weight of the World: Exploring Maternal Embodiment (Chapter: Indeterminate Life: Dealing with Radioactive Contamination as a Voluntary Evacuee Mother)

October 2018

The maternal body is a site of contested dynamics of power, identity, experience, autonomy, occupation, and control.

Scarcity in abundance: the challenges of promoting energy access in the Southern African region

October 2018

Abstract: The paper deals with the challenges of energy access, efficiency and security as essential conditions to improve people's living in the Southern African region.

The Strategic Promise of Offensive Cyber Operations

September 2018

Abstract: Could offensive cyber operations provide strategic value? If so, how and under what conditions?

It's Not Too Late to Prevent a Russia-China Axis

September 2018

Chinese tanks splashed through the mud, while a few dozen helicopters flew in formation overhead in eastern Russia, and a young Chinese military recruit explained, “I have never experienced an...

Chronic long-term risk of low-level radiation exposure: Bridging the lay/expert divide

August 2018

Abstract: The failure of experts and lay people to understand each other has been fueling conflict around the environmental clean-up of the many sites in the United States that are contaminated by...

Chronic long-term risk of low-level radiation exposure: Bridging the lay/expert divide.

August 2018

Abstrac: The failure of experts and lay people to understand each other has been fueling conflict around the environmental clean-up of the many sites in the United States that are contaminated by...

Integrating offensive cyber capabilities: meaning, dilemmas, and assessment

August 2018

Across the world, states are establishing military cyber commands or similar units to develop offensive cyber capabilities.

Integrating Offensive Cyber Capabilities: Meaning, dilemmas, and assessment

August 2018

Abstract: Across the world, states are establishing military cyber commands or similar units to develop offensive cyber capabilities.

People

Rod Ewing Rodney C. Ewing Senior Fellow Professor of Geological Sciences
Steve Luby Headshot Stephen P. Luby Senior Fellow Professor, Medicine (CHP/PCOR)
colin kahl Colin H. Kahl Senior Fellow Steven C. Házy Senior Fellow at the Center for International Security and Cooperation, Professor, by courtesy, Political Science
Stedman Steve Stephen J. Stedman Senior Fellow, Professor, by courtesy, Political Science
Naimark, Norman Norman M. Naimark Senior Fellow, by courtesy Professor, History, Professor, by courtesy, German Studies, Senior Fellow, the Hoover Institution
bmkhigh Beatriz Magaloni Senior Fellow Professor, Political Science
Dr. Thomas Fingar Thomas Fingar Lecturer at APARC
Women looking straight forward Amy Zegart Senior Fellow Senior Fellow, Hoover Institution, Professor, by courtesy, Political Science
rsd19 072 0081a Harold Trinkunas Deputy Director, Senior Research Scholar
toomas hendrik ilves 73502529 Toomas Hendrik Ilves Distinguished Visiting Fellow, Hoover Institution, GDPi Fellow, Stanford Cyber Initiative Fellow
rsd18 083 0009a Alex Stamos Director, Stanford Internet Observatory