Search

Search Constraints

Begin New Search You searched for: Topic Security Remove constraint Topic: Security Content Type Working Paper Remove constraint Content Type: Working Paper Publication Year within 10 Years Remove constraint Publication Year: within 10 Years Publication Year within 5 Years Remove constraint Publication Year: within 5 Years Publication Year within 3 Years Remove constraint Publication Year: within 3 Years

Search Results

1. A battle against time – and against Putin’s Russia

2. China's Political-Economy, Foreign and Security Policy: 2023

3. China, climate change and the energy transition

4. NATO’s 2022 Strategic Concept. Analysis and implications for Austria

5. Why Gender Balance Matters for Equity and Peace in the Indo-Pacific

6. The United States & Japan: Allied Against Disinformation

7. EU-South Korea Extend Cooperation Beyond the Economy

8. Examining Changes in Regional Cooperation in Central Europe from a Polish Perspective

9. China Becoming Globally More Active in the Security Sphere

10. Implications of the Incursions into U.S. and Canadian Airspace

11. Evolution, not Revolution: Japan Revises Security Policy

12. Section 232 reloaded: the false promise of the transatlantic ‘climate club’ for steel and aluminium

13. Mateship Amongst Competition: Recommendations for the U.S.-Australia Alliance

14. Follow the money: connecting anti-money laundering systems to disrupt environmental crime in the Amazon

15. Assessing the importance of new corridors in the South Caucasus in the context of the RussianUkrainian war

16. Prescription for Military Paralysis: Wartime Reactor Meltdowns (Occasional Paper 2305)

17. NATO in the North: The emerging division of labour in Northern European security

18. Enhancing small state preparedness: Risks of foreign ownership, supply disruptions and technological dependencies

19. Drafting Greece’s “Internal Security Strategy” – Challenges and Prospects

20. Addressing Cohesion Policy’s identity crisis in a changing European Union

21. Quantum technologies and value chains: Why and how Europe must act now

22. Soldiers out, civilians left behind: EU lessons from the evacuation of Kabul

23. EU-Ukraine wartime trade: Overcoming difficulties, forging a European path

24. Peninsula Plus: Enhancing U.S.–South Korea Alliance Cooperation on China, Multilateralism, and Military and Security Technologies

25. Buying Time: Logistics for a New American Way of War

26. Charting a Transatlantic Approach to Russia: A Working Paper of the Transatlantic Forum on Russia

27. The Default Policy Option: Chaos

28. Progress toward a breakthrough in Saudi-Israeli relations: ‘Haste is from the Devil’

29. There are certain times when national security challenges must overcome a divided nation

30. Explaining the experience of political violence in Nigeria

31. No Water’s Edge: Russia’s Information War and Regime Security

32. Phase-based Tactical Analysis of Online Operations

33. The Russian-Ukrainian War: An Opportunity to Strengthen the AfCFTA

34. Fighting Against Internal and External Threats Simultaneously: China’s Police and Satellite Cooperation with Autocratic Countries

35. Countering United Front Work: Taiwan’s Political Warfare System

36. The EU and CT-P/CVE in its external action

37. De-colonising the Azerbaijan-Armenian Conflict: Breaking the Knot of Security and Dependence

38. Australia’s Response to the China Threat: The Case for Engagement

39. Japan’s Expanded Regional Security Role: The Challenge of China

40. Assessing the groundwork: Surveying the impacts of climate change in China

41. The Impact of Artificial Intelligence on Military Defence and Security

42. Sign of the Times: How the United Kingdom’s Integrated Review Affects Relations with Africa

43. Border Nation: The Reshaping of the Syrian-Turkish Borderlands

44. Protesting Against Crime and Insecurity: High-Risk Activism in Mexico's Drug War

45. Space Traffic Management: Time for Action

46. The Waning India-Russia Partnership is an Unexpected Effect of the War in Ukraine

47. Inside China’s Techno-Security State

48. Inventory of data on economic activity and deforestation in the Amazon Basin

49. Mine Action as a Confidence- and Security-building Measure in the OSCE Region

50. Blockchain Technology: An Innovative Policy Tool for Enhancing Conventional Arms Control and Verification

51. Commitment to Control Weaponised Artificial Intelligence: A Step Forward for the OSCE and European Security

52. Securing AI-based Security Systems

53. The White Paper on the Future of Environmental Peacebuilding

54. Peace and Security 2025

55. Delay, Detect, Defend: Preparing for a Future in which Thousands Can Release New Pandemics

56. The Impact of the Russia-Ukraine War on the Global Sanctions Landscape

57. Rudiments of a Space Security Policy Framework

58. The Pitfalls of Saudi Arabia’s Security-Centric Strategy in Yemen

59. The Challenges of Data Collection in Conflict-affected Areas: A Case Study in the Liptako-Gourma Region

60. Gender Dimensions of Climate Insecurity

61. Climate Change and Violent Conflict in West Africa: Assessing the Evidence

62. The EU as a Soft Power Superpower: Why a Green Marshall Plan for the Sahel Is Imperative

63. The Russian Soldiers’ Question Revisited

64. Mobilizing Against Russia? Some Reflections on the Security Deadlock Called Ukraine

65. Global South Perspectives on a Global Ban on Nuclear Weapons: A Comparative Approach

66. What is new about the reset between Israel and Turkey?

67. Georgian-Greek Relations: Building a Strategic Dimension

68. Greece and Turkey in the world today: the public’s view

69. Turkey’s quest for Strategic Autonomy

70. Europe after Putin’s War: EU Foreign and Defence Policy in the new European security architecture

71. Achieving qualitative superiority: Greek conscription and the Turkish threat

72. After Russia’s invasion of Ukraine: Unity is good, but ambition is better

73. Overcoming the ambition-unity dilemma

74. The Space Imperative: A Whole-Of-Nation Approach to a Sustainable, Secure, and Resilient Space Domain

75. Parliamentary oversight of the police and the EU accession process – a missing link in the fundamentals-first approach

76. Geopolitics is Local – Ramifications of Chinese Projects for Human Security in Serbia

77. Rethinking the Dutch position towards the Western Balkans in the new security environment in Europe

78. They melted down our tanks, we are creating the strongest power in the region – militarist narratives serving the purpose of state capturing

79. Resilience to Violent Extremism in Serbia: The Case of Sanjak

80. Gender Security and Safety in the ASEAN Digital Economy

81. Development Effectiveness in the “New Normal”: What Do the Changing Roles and Purposes of ODA Mean for the Effectiveness Agenda?

82. Social Protection in the COVID-19 Pandemic: Lessons from South Africa

83. NATO’s 2022 Strategic Concept: Matching Ambition with Reality

84. Russian Strategic Interest in Arctic Heats Up as Ice Melts

85. China’s Digital Silk Road in Indonesia: Progress and implications

86. Regime Change No More: Coming to Terms with the Greater Middle East

87. Defying United Nations Sanctions: Three Reasons for African Engagement with North Korea

88. Debunking the Korean Peninsula "Arms Race": What's Behind South Korea's Military Force Development?

89. Inter-Korean Reconciliation and the Role of the U.S.: Facilitator or Spoiler?

90. UN Peacekeeping and the Protection of Civilians from Sexual and GenderBased Violence

91. Early Warning in the Taiwan Strait

92. U.S. Coast Guard Academy Cultural Competence Assessment

93. A Call to Action: The Federal Government’s Role in Building a Cybersecurity Workforce for the Nation

94. The Security Ghost of the January 25th Revolution in al-Sisi Regime’s Policy toward Gaza

95. Proceed with Caution: Israeli Research Collaboration with China

96. Difficulties in the Negotiations with Iran: Implications for Israel

97. The American Withdrawal from Afghanistan, One Year Later

98. To What Extent is Israel Prepared for the Growing Threat of UAVs?

99. The Rift in Fatah, which Threatens Security Stability, is a Challenge – and Not Only for Israel

100. Operation Breaking Dawn: Following the Successful Entry, an Exit Strategy is Required