FSI researchers strive to understand how countries relate to one another, and what policies are needed to achieve global stability and prosperity. International relations experts focus on the challenging U.S.-Russian relationship, the alliance between the U.S. and Japan and the limitations of America’s counterinsurgency strategy in Afghanistan.
Foreign aid is also examined by scholars trying to understand whether money earmarked for health improvements reaches those who need it most. And FSI’s Walter H. Shorenstein Asia-Pacific Research Center has published on the need for strong South Korean leadership in dealing with its northern neighbor.
FSI researchers also look at the citizens who drive international relations, studying the effects of migration and how borders shape people’s lives. Meanwhile FSI students are very much involved in this area, working with the United Nations in Ethiopia to rethink refugee communities.
Trade is also a key component of international relations, with FSI approaching the topic from a slew of angles and states. The economy of trade is rife for study, with an APARC event on the implications of more open trade policies in Japan, and FSI researchers making sense of who would benefit from a free trade zone between the European Union and the United States.
Role of Economic Incentives in Securing Cyberspace, The
In the last eight years, every significant public policy initiative to address the safety and security of U.S. national information infrastructure has recommended a significant, largely voluntary, role for the private sector, owing in large part to the dominant ownership stake of private entities in the infrastructure. Notably absent from much of the policy discourse and underlying research has been a careful examination of the stakeholder incentives to adopt and to spur the development of security technologies and processes. We believe that the lack of progress to date in achieving a secure and robust cyber infrastructure is in large part the direct result of a failure by public policy to recognize and to address those incentives and the technological, economic, social and legal factors underlying them.
We advocate a new approach for the analysis and development of coherent policy in which the interaction of economic incentives among stakeholders is explicitly considered. By economic incentives, we mean the full array of economic and technological factors that shape infrastructure decision-making, not merely government subsidies or tax credits. We provide an initial framework for understanding the technology dependencies and economic incentives associated with cyber security, along with illustrative examples of the key players and their motivations. We argue that the successful development of a secure cyber infrastructure will require more than improved technology and that it could be accelerated by careful consideration of the evolving economic and legal issues that shape stakeholder incentives.
How Organizations Learn: Current Debates and a Modest Proposal ... for Redirection
Marc J. Ventresca is University Lecturer in Management Studies at Saïd Business School, University of Oxford, Fellow of Wolfson College, and University Fellow at the James Martin Institute for Science and Civilization. For 2004-5 he is a Research Fellow in Organizational Learning and Homeland Security, CISAC, IIS, Stanford University.
His research and teaching interests focus on institutions, organizations, and industry entrepreneurship; organizational learning; organization design and managing change; environmental management; power and leadership in organizations, and economic sociology of strategy.
He earned his Ph.D. in sociology at Stanford University, after master's degrees in policy analysis and education and in sociology. He has taught at the Kellogg School of Management, Northwestern University, the University of Illinois, the Copenhagen Business School, the Center for Work, Technology, and Organizations at Stanford University, and the Stanford Institute for Research on Higher Education.
Prior to a faculty career, Dr. Ventresca worked as a policy analyst at the Congressional Budget Office in Washington D.C., studied language and politics in Florence, Italy, and worked as a technical writer for hopeful start-ups in Silicon Valley.
Reuben W. Hills Conference Room, East 207, Encina Hall
Rebecca Slayton
Slayton’s research and teaching examine the relationships between and among risk, governance, and expertise, with a focus on international security and cooperation since World War II. Slayton’s current book project, Shadowing Cybersecurity, examines the historical emergence of cybersecurity expertise. Shadowing Cybersecurity shows how efforts to establish credible expertise in corporate, governmental, and non-governmental contexts have produced varying and sometimes conflicting expert practices. Nonetheless, all cybersecurity experts wrestle with the irreducible uncertainties that characterize intelligent adversaries, and the fundamental inability to prove that systems are secure. The book shows how cybersecurity experts have paradoxically gained credibility by making threats and vulnerabilities visible, while acknowledging that more always remain in the shadows.
Slayton’s first book, Arguments that Count: Physics, Computing, and Missile Defense, 1949-2012 (MIT Press, 2013), shows how the rise of a new field of expertise in computing reshaped public policies and perceptions about the risks of missile defense in the United States. In 2015, Arguments that Count won the Computer History Museum Prize. In 2016, Slayton was awarded a National Science Foundation CAREER grant for her project “Enacting Cybersecurity Expertise.” In 2019, Slayton was also a recipient of the United States Presidential Early Career Award for Scientists and Engineers, for her NSF CAREER project.
Karthika Sasikumar
Karthika Sasikumar began her education in Hyderabad, India. She obtained her undergraduate degree from St. Francis College for Women. From 1995 to 1999, she was a student at Jawaharlal Nehru University in New Delhi, where she earned Master's and M.Phil Degrees from the School of International Studies.
Dr. Sasikumar received her Ph.D. from the Government Department at Cornell University in 2006. Her dissertation explores the interaction between India and the international nuclear nonproliferation order.
Before coming to San Jose State University, where she is a Professor of Political Science, Dr. Sasikumar was a Program Associate at the American Academy of Arts and Sciences, and an Associate in the International Security Program at Harvard University’s Kennedy School of Government, both in Cambridge, Massachusetts. She has also been a Postdoctoral Fellow at the University of British Columbia’s Liu Institute for Global Issues in Vancouver, and a Predoctoral Fellow at the Center for International Security and Cooperation, Stanford University.
In 2010-11, she spent a year at the Belfer Center as the first Stanton Nuclear Security Junior Faculty Fellow. She is the Vice-Chair of the SJSU Senate, and has served as a mentor in the Preparing Future Professors Program, and as the Co-PI for the university’s Intelligence Community Center for Academic Excellence.
Her research and teaching interests are in International Relations theory, international regimes, global security, migration, and national identity.
Kenneth A. Schultz
Department of Political Science
Stanford University
Encina Hall West
Stanford, CA 94305-6044
Kenneth A. Schultz is professor of political science and a CISAC core faculty member at Stanford University. His research examines international conflict and conflict resolution, with a particular focus on the domestic political influences on foreign policy choices. He is the author of Democracy and Coercive Diplomacy and World Politics: Interests, Interactions, and Institutions (with David Lake and Jeffry Frieden), as well as numerous articles in peer-reviewed scholarly journals. He was the recipient the 2003 Karl Deutsch Award, given by the International Studies Association, and a 2011 Dean’s Award for Distinguished Teaching, awarded by Stanford’s School of Humanities and Sciences. He received his PhD in political science from Stanford University.
Lawrence M. Wein
Graduate School of Business
Stanford University
Stanford, CA 94305-5015
Lawrence Wein is the Jeffrey S. Skoll Professor of Management Science at the Graduate School of Business, Stanford University, and an affiliated faculty member at CISAC. After getting a PhD in Operations Research from Stanford University in 1988, he spent 14 years at the Sloan School of Management at MIT, where he was the DEC Leaders for Manufacturing Professor of Management Science. His research interests include mathematical models in operations management, medicine and biology.
Since 2001, he has analyzed a variety of homeland security problems. His homeland security work includes four papers in Proceedings of the National Academy of Sciences, on an emergency response to a smallpox attack, an emergency response to an anthrax attack, a biometric analysis of the US-VISIT Program, and an analysis of a bioterror attack on the milk supply. He has also published the Washington Post op-ed "Unready for Anthrax" (2003) and the New York Times op-ed "Got Toxic Milk?", and has written papers on port security, indoor remediation after an anthrax attack, and the detention and removal of illegal aliens.
For his homeland security research, Wein has received several awards from the International Federation of Operations Research and Management Science (INFORMS), including the Koopman Prize for the best paper in military operations research, the INFORMS Expository Writing Award, the INFORMS President’s Award for contributions to society, the Philip McCord Morse Lectureship, the Frederick W. Lanchester Prize for best research publication, and the George E. Kimball Medal. He was Editor-in-Chief of Operations Research from 2000 to 2005, and was elected to the National Academy of Engineering in 2009.
Nuclear Proliferation Rings: New Challenges to the Nuclear Nonproliferation Regime
The nuclear programs of the Democratic People's Republic of Korea (DPRK), Iran, and Pakistan provide the most visible manifestations of three broad and interrelated challenges to the nuclear nonproliferation regime. The first is so-called latent proliferation, in which a country adheres to, or at least for some time maintains a façade of adhering to, its formal obligations under the Nuclear Nonproliferation Treaty (NPT) while nevertheless developing the capabilities needed for a nuclear weapons program. That country can then either withdraw from the NPT and build actual weapons on short notice, or simply stay within the NPT while maintaining the latent capability for the rapid realization of nuclear weapons as a hedge against future threats. This was the path followed by the DPRK with its plutonium program and one that is likely being followed by Iran and more subtly by others. The second broad challenge is first-tier nuclear proliferation, in which technology or material sold or stolen from private companies or state nuclear programs assists nonnuclear weapons states in developing illegal nuclear weapons programs and delivery systems. The third challenge--the focus of this article--is second-tier nuclear proliferation, in which states in the developing world with varying technical capabilities trade among themselves to bolster one another's nuclear and strategic weapons efforts.
Detecting Nuclear Material in International Container Shipping: Criteria for Secure Systems
This article grew out of a week-long study in August 2002 to assist ongoing efforts inside and outside the government to remedy some vulnerabilities of the international shipping system on which US and a great deal of world prosperity depend. The study's objective was to identify the most important research initiatives and the major policy issues that need to be addressed in order to improve security of imports using shipping containers, particularly against the importation of nuclear materials and weapons, while maintaining an open trading system. To be effective, a system to detect nuclear weapons or special nuclear material before they reach U.S. ports must be international in scope and reach. It must also be economically acceptable both in terms of total cost and with respect to how these costs are allocated; degrade gracefully when subjected to attack; produce actionable intelligence in a timely manner; treat false alarms realistically; be adaptable to a variety of local physical and political conditions; be auditable, secure yet accessible to the needed foreign and domestic security agencies, and have clear lines of oversight and responsibility. Finally, the system should be flexible enough to allow for regular updates as users and operators gain experience and system performance is reviewed. This study identified a sample technical approach that is feasible technically and operationally and involves components already in the early deployment stage. The approach involves container certification; monitoring at ports of embarkation, debarkation, and continuously during shipment and storage; and continuous data fusion. Specific recommendations regarding system characteristics made by the study include rigorous testing during deployment and in the field, international coordination of standards and protocols, careful analysis of the system for compatibility with pertinent governmental policies and business and labor agreements, and early provision for forward-looking research and development.
Disrupting Terrorist Travel: Safeguarding America's Borders Through Information Sharing
Testimony before the U.S. House of Representatives' Select Committee on Homeland Security
There is a serious but reparable vulnerability in the biometric identification system of the US-VISIT Program, which is our last line of defense for keeping terrorists off U.S. soil. A minor software modification that allows the watchlist rule to vary with image quality can increase detection from 53% to 73%. I have provided details to officials who oversee the US-VISIT operations, and this should be implemented as soon as possible. The use of more than 2 fingers for low-quality images can achieve a detection probability of 95%. Although switching from a 2-fingerprint to a 10-fingerprint system may be costly and disruptive, there is no excuse for a 10-billion dollar program to settle for performance below this level. Indeed, our results are not inconsistent with the warning in the November, 2002 NIST report that a 2-finger search was not sufficient for identification from a large watchlist. If slower 2-finger matching algorithms cannot approach 95% detection for poor-quality images, then the US-VISIT Program should be reconfigured with 10-fingerprint scanners as soon as possible.
Our recommendations hinge on the assumption that terrorist organizations as sophisticated as Al Qaeda will eventually attempt to defeat the US-VISIT system by employing terrorists with poor quality fingerprints.