Search

You searched for: Publishing Institution Center for International and Security Studies at Maryland (CISSM) Remove constraint Publishing Institution: Center for International and Security Studies at Maryland (CISSM) Political Geography United States Remove constraint Political Geography: United States Publication Year within 3 Years Remove constraint Publication Year: within 3 Years Publication Year within 25 Years Remove constraint Publication Year: within 25 Years Topic Security Remove constraint Topic: Security
Number of results to display per page

Search Results

  • Author: Sara Z. Kutchesfahani
  • Publication Date: 09-2019
  • Content Type: Working Paper
  • Institution: Center for International and Security Studies at Maryland (CISSM)
  • Abstract: This paper analyzes China’s words and actions regarding the Nuclear Security Summits to better understand what Chinese leadership on nuclear security could look like in the future. It finds that China accomplished the many things it said it would do during the summit process. The paper also explores how China’s policy and actions in other nuclear arenas could be paired with Chinese nuclear security policy to form a coherent agenda for nuclear risk reduction writ large. Consequently, the paper addresses how China doing as it says and does – per nuclear security – may be used as a way in which to inform its future nuclear security roles and responsibilities. In particular, it assesses China’s opportunities to assume a leadership role within this crucial international security issue area, especially at a time where U.S. leadership has waned.
  • Topic: Security, Diplomacy, Military Strategy, Nuclear Power
  • Political Geography: United States, China, Beijing, Asia
  • Author: Charles Harry, Nancy Gallagher
  • Publication Date: 02-2018
  • Content Type: Working Paper
  • Institution: Center for International and Security Studies at Maryland (CISSM)
  • Abstract: Publicity surrounding the threat of cyber-attacks continues to grow, yet immature classification methods for these events prevent technical staff, organizational leaders, and policy makers from engaging in meaningful and nuanced conversations about the risk to their organizations or critical infrastructure. This paper provides a taxonomy of cyber events that is used to analyze over 2,431 publicized cyber events from 2014-2016 by industrial sector. Industrial sectors vary in the scale of events they are subjected to, the distribution between exploitive and disruptive event types, and the method by which data is stolen or organizational operations are disrupted. The number, distribution, and mix of cyber event types highlight significant differences by sector, demonstrating that strategies may vary based on deeper understandings of the threat environment faced across industries. EXPLORE:
  • Topic: Security, Science and Technology, Cybersecurity
  • Political Geography: United States, Washington, D.C.