Policy Analysis

Recent Publications

Records 24 / 95

Catastrophic Terrorism: Elements of a National Policy

October 1998

This report is a product of the Catastrophic Terrorism Study Group, a nine-month long collaboration of faculty from Harvard University, the Massachusetts Institute of Technology, Stanford...

Defense Investment: A Strategy for the 1990s

December 1989

The national security strategy of the United States since World War II has changed frequently during the course of eight administrations and two wars.

Defense Resource Allocation in the 1990s: A Rational Approach

July 1990

This paper addresses the steps that the United States should take to insure the continuation of its position of influence and involvement in world commerce and geopolitics in light of the...

Deterrence and Defense: Opportunities for a Future European Defense Policy

March 1997

The renewed American debate over ballistic missile defenses (BMD) echoes loudly in NATO, in Europe, and in France.

Do We Need Arms Control If Peace Breaks Out?

September 1990

The world is facing truly breathtaking changes, in particular from the socialist countries.

High-Performance Computing, National Security Applications, and Export Control Policy at the Close of the 20th Century

May 1998

If high-performance computing (HPC) export control policy is to be effective, three basic premises must hold: There exist problems of great national security importance that require high...

How Much Ballistic Missile Defense Is Enough?

October 1998

This paper examines how well future U.S. national and theater missile defense systems will have to perform to meet reasonable defense objectives as a function of the level of the threat.

Japanese Defense Technology and the FS-X Controversy

July 1988

It is the American view that Japan has been totally dependent on the United States for its national security, and that this favorable condition has enabled the Japanese to dedicate themselves fully...

New Dimensions of the International Security System after the Cold War

April 1996

Executive SummaryThis paper considers the emerging structure of the international security system after the end of the Cold War.

Privatization, Conversion, and Enterprise Reform in Russia

May 1994

The papers in this volume are revised versions of presentations made by the authors at a conference on economic reform in Russia, which was held at Stanford University on November 22 and 23, 1993....

Reforming the Department of Defense: The Revolution in Business Affairs (Volume 1, Number 4)

February 1999

The Revolution in Business Affairs (RBA) is an effort to improve the overall effectiveness of the Department of Defense (DOD) by increasing the efficiency of its support operations.

Report of the third Russian-American Entrepreneurial Workshop on Defense Technology Conversion held at Lawrence Livermore National Laboratory

January 1995

This report comprises a description, summary, and analysis of an entrepreneurial training workshop for Russian nuclear scientists held at the Lawrence Livermore National Laboratory (LLNL), May 9-20...

Soviet Defense Conversion - Problems and Opportunities

September 1991

In August 1991, the people of Moscow and Leningrad demonstrated to the world that democracy is an idea whose time had come for the Soviet Union.

Content of U.S. Engagement with China (Volume 1, Number 2), The

July 1998

Role of U.S. Nuclear Weapons in Regional Conflict, The

April 1994

With the ending of the Cold War, regional conflicts have come increasingly to the fore.  U.S. foreign policy goals in such areas continue to involve a mix of U.S.

U.S. Military and Civil Infrastructure Protection: Restrictions and Discretion under the Posse Comitatus Act, The

November 1999

This article sets out the constraints of the Posse Comitatus Act of 1878 (the “Act”), which generally prohibits active enforcement of civilian laws by the military, and describes the discretion of...

More Secure World: Our Shared Responsibility, A

December 2004

United Nations Secretary-General Kofi Annan created the High-Level Panel on Threats, Challenges, and Change in September 2003 with SIIS and CISAC senior fellow Stephen J.

Potential Sources of Financing for U.S. Ventures in Russia

December 2001

Following the end of the Cold War, the United States and its allies recognized that it was in their vital security interests to promote stable transitions in the countries of Central and Eastern...

Is the Elephant Learning to Dance? The Diffusion of the Internet in the Republic of India

April 2002

Published in conjunction with the Georgia Tech Information Security Center (GTISC), Georgia Institute of Technology.

Power and Purpose: American Policy toward Russia after the Cold War

December 2003

Russia, once seen as America's greatest adversary, is now viewed by the United States as a potential partner.

U.S. Foreign Policy and Chechnya

December 2003

Chechnya has been and remains one of the greatest stains in Russia's efforts to move toward a more open and democratic system .

Real Putin, The

July 2003

Who is Vladimir Putin?

A Man for All Seasons: A New, More Flexible George W. Bush?

September 2002

President George W.

Change the Focus on Iraq

September 2002

PALO ALTO, CALIF.A year ago, a group of terrorists from Saudi Arabia and Egypt attacked the United States using box cutters as their weapons and citing extremist versions of Islamic fundamentalism...

People

Stephen J. Stedman Senior Fellow, Professor, by courtesy, Political Science
Beatriz Magaloni Senior Fellow Professor, Political Science
Andrew Grotto Andrew Grotto Research Scholar, Lecturer
Gail W. Lapidus Senior Fellow, Emerita Professor, Political Science, Emerita
Asfandyar Mir Postdoctoral fellow
Melissa Hanham Affiliate
Irving Lachow Irving Lachow Affiliate