Information Technology

Recent Publications

Records 96 / 1001

Cheap fights, credible threats: The future of armed drones and coercion

February 2018

Drones are considered poor coercion tools: They cannot operate in contested airspace and they offer low-cost fights instead of more credible, costly signals.

Offensive Cyber Capabilities: To What Ends?

January 2018

Abstract: There is a growing interest in the use of offensive cyber capabilities (OCC) among states.

Countering the Proliferation of Offensive Cyber Capabilities

December 2017

Jihadist Terrorist Plots in the United States

December 2017

Research brief: How plots come to fail or to be foiled is of great importance to the study of terrorism and to the development of counterterrorism policy.

Militants, Criminals, and Warlords - The Challenge of Local Governance in an Age of Disorder

November 2017

The sovereign state is frequently held up as the legitimate source of domestic order and an important provider of public goods in any society, regardless of regime type.

Nuclear Weapons Scholarship as a Case of Self-Censorship in Security Studies

November 2017

Security studies scholarship on nuclear weapons is particularly prone to self-censorship.

Beyond regulatory capture: Coproducing expertise for critical infrastructure protection

September 2017

Complex industries such as petroleum production, civil aviation, and nuclear power produce “public risks” that are widely distributed and temporally remote, and thus tend to be ignored by the risk...

On Defining Global Catastrophic Biological Risks

July 2017

The Johns Hopkins Center for Health Security has formulated an encompassing working definition of global catastrophic biological risks (GCBRs) that reflects diverse sources of risk and mechanisms...

Countering Terrorism

July 2017

Fifteen years after September 11, the United States still faces terror threats—both domestic and foreign.

The unbearable lightness of luck. Three sources of overconfidence in the manageability of nuclear crises

July 2017

Overconfidence in the controllability of nuclear weapons creates danger. The passing of the last elite witness of the most dangerous nuclear crisis, i.e.

Office of the Director of National Intelligence: From Pariah and Piñata to Managing Partner

June 2017

This is a chapter in the second edition of The National Security Enterprise, a book edited by Roger Z.

A MOOC With Meaning

May 2017

Under the sponsorship of Stanford University, we designed a massive open online course (MOOC) to raise public consciousness about the past, present, and future dangers of nuclear weapons.

Japan's Shift in the Nuclear Debate: A Changing Identity?

May 2017

Sayuri Romei, a political scientist and predoctoral fellow at Stanford’s Center for International Security and Cooperation (CISAC), has a new working paper that shows Japan is an increasingly...

On Cyber-Enabled Information/Influence Warfare and Manipulation

April 2017

CISAC's Herbet Lin and Jackie Kerr from the Lawrence Livermore National Laboratory write in this draft working paper that the United States has no peer competitors in conventional military power. ...

Structuring Cooperative Nuclear Risk Reduction Initiatives with China

April 2017

CISAC's Siegfried Hecker, Larry Brandt and Jason Reinhardt worked with Chinese nuclear organizations on issues involving radiological and nuclear terrorism.

When Science Brought Americans and Russians Together

April 2017

Siegfried Hecker describes the scientific collaboration that took place between Russian and American nuclear weapons laboratories following the end of the Cold War.

Uneasy Partnerships: China’s Engagement with Japan, the Koreas, and Russia in the Era of Reform

April 2017

Uneasy Partnerships presents the analysis and insights of practitioners and scholars who have shaped and examined China's interactions with key Northeast Asian partners.

An Approach for Identifying and Analyzing Implicit Interactions in Distributed Systems

March 2017

Safety-critical system domains such as critical infrastructures, aerospace, automotive, and industrial manufacturing and control are becoming increasingly dependent on the use of distributed...

Conditions of military contestation in populist Latin America

March 2017

Latin America experienced recurring episodes of populism, and of military reaction against populists, during the twentieth century, frequently ending in coups d’état.

A visit to Russia's secret nuclear labs

March 2017

In this essay, Siegfried Hecker describes a 1992 visit to nuclear facilities in the former Soviet Union.

Introduction to the special issue on strategic dimensions of offensive cyber operations

March 2017

Nations around the world recognize cybersecurity as a critical issue for public policy.

People

lapidus Gail W. Lapidus Senior Fellow, Emerita Professor, Political Science, Emerita
Alla Kassianova Alla Kassianova Research Scholar
Wein Lawrence M. Wein Professor, Management Science
Vardi, Gil li Gil-li Vardi Lecturer, GSB, History
Rob MacCoun Robert MacCoun Senior Fellow Professor of Law
Man in a black suit smiling Ronald E Robertson Postdoctoral Fellow, Stanford Internet Observatory
man smiling Martin Durdovic Visiting Scholar
woman smiling COL Carol M. Stauffer Visiting Scholar
man in suit smiling James Goldgeier Visiting Scholar
headshot of Josh Goldstein Josh A. Goldstein Postdoctoral Fellow, Stanford Internet Observatory
man Gorakh Pawar Visiting Scholar
man smiling J. Luis Rodriguez Stanton Postdoctoral Fellow