Search

Search Constraints

Begin New Search You searched for: Topic International Security Remove constraint Topic: International Security Political Geography Global Focus Remove constraint Political Geography: Global Focus Publication Year within 25 Years Remove constraint Publication Year: within 25 Years

Search Results

1. Trojan spoofing: A threat to critical infrastructure

2. Tecnología y desigualdad: la gobernanza tecnológica como nuevo paradigma de la seguridad internacional

3. Are Gender Inclusive Militaries Better at Integrating Disruptive Technologies?

4. IS CLIMATE CHANGE DRIVING GLOBAL CONFLICT?

5. International Information Security Threats as Side Effects of Modern Technologies

6. A Gender Framework for Arms Control and Disarmament

7. The Dominance Dilemma: The American Approach to NATO and its Future

8. Principles for Building Confidence and Stability into National Defenses and International Security – toward sufficient, affordable, robust, and reliable defense postures

9. Psychological Resilience to Extremism and Violent Extremism

10. Bridging the Silos: Integrating Strategies across Armed Conflict, Violent Crime, and Violent Extremism to Advance the UN’s Prevention Agenda

11. NATO and 5G: Managing “High Risk” Vendors and Other Outsourced Infrastructure

12. Bargaining and War: On the Communication Equilibrium in Conflict Games

13. Pentagon Fuel Use, Climate Change, and the Costs of War

14. How to make the European Green Deal work

15. A Vision for Nuclear Security

16. Combating Complacency about Nuclear Terrorism

17. Energy Geopolitics in 2019

18. Opportunities for Cooperative Cyber Security

19. Beyond Control: Iran and its Opponents Locked in a Lopsided Confrontation

20. The post-caliphate Salafi-jihadi environment

21. Estimating the cost of capital for wind energy investments in Turkey

22. The Ukraine Whistleblowers and the Rise of Partisan Whistleblowing

23. New Forms of Public Administration Activity in Poland after 1989 as an Attempt of Realization Current Social Demands

24. The Demographic Transition Theory of War: Why Young Societies Are Conflict Prone and Old Societies Are the Most Peaceful

25. Wars in the later 21st century: Forecast developments in the methods of warfare

26. The Thirty Years Climate Warning: Climate Change, Security, and the Responsibility to Prepare

27. Missing Figures: The Cybersecurity Gender Gap

28. The “Deal of the Century”: The Final Stage of the Oslo Accords

29. Inadvertent Escalation and the Entanglement of Nuclear Command-and-Control Capabilities

30. The 2018 Small Arms Trade Transparency Barometer

31. Life-cycle Management of Ammunition (LCMA): Lessons from Bosnia and Herzegovina

32. Water Crises, Security and Climate Change

33. New Armies for a New Era Decrypting post-2011 Arab Military Reform Trends

34. Friendly Force Dilemmas in Europe: Challenges Within and Among Intergovernmental Organizations and the Implications for the U.S. Army

35. USAWC Research Plan AY 2018

36. Avoiding the Trap: U.S. Strategy and Policy for Competing in the Asia-Pacific Beyond the Rebalance

37. Failure to define killer robots means failure to regulate them

38. Trends in international arms transfers 2017

39. WPS+GPS: Adding Gender to the Peace and Security Equation

40. Untangling the Web: A Blueprint for Reforming American Security Sector Assistance

41. 2017 Natural Resource Governance Index

42. Beyond the Caliphate

43. Mission to the Middle East 2017: The Plight of the Displaced

44. After ISIS: How to Win the Peace in Iraq and Libya

45. The Plutonium Disposition Management Agreement: Russia’s Withdrawal and the Possible Consequences

47. Unpacked: The threat from North Korea

48. North Korea and the Middle East

49. Non-proliferation challenges facing the Trump administration

50. Can a Hydra Ever Be a Good Pet? Federal Information Technology Modernization’s Likely Failure

51. Fighting Corruption: A Manifesto for a more secure,prosperous and resilient UK.

52. Zombie Nato

53. 2017-18 Key Strategic Issues List

54. Armed Robotic Systems Emergence: Weapons Systems Life Cycles Analysis and New Strategic Realities

55. Evaluation of the 2015 DoD Cyber Strategy: Mild Progress in a Complex and Dynamic Military Domain

56. Terrorist Sanctuary in the Sahara: A Case Study

58. Daesh Meta-Narratives: From the Global Ummah to the Hyperlocal

59. Contemporary Global Security Challenges

60. The G20 Hamburg Summit

61. The North Korean Challenge: Insights from the Far East for the Middle East

62. Co-ordination in Tense Times: Issues for the G7

63. G7 Economic Cooperation in the Trump Era

64. The G7’s Task for Restoring Growth and Stability

65. European cybersecurity policy – Trends and prospects

66. The Future of Trade

67. 2017 Zeev Schiff Memorial Lecture with Maj. Gen. Yair Golan

68. “The Terrorism of the Possible” sweeping Europe

69. Gender Equality as a National Security Priority

70. The "Section 702" Surveillance Program

71. A Blueprint for New Sanctions on North Korea

72. Artificial Intelligence and National Security

73. Higher, Heavier, Farther, and now Undetectable?

74. Toward an “Open Source” Maritime Force Structure

75. Following the Money: A Primer on Terrorist Financing

76. Homeland Security Recommendations

77. Mapping the Global Legal Landscape of Blockchain and Other Distributed Ledger Technologies

78. Digital Entrepreneurship: Expanding the Economic Frontier in the Mediterranean

79. Militarization of social media: strategies and challenges

80. Xi Transforms the PLA: How the Military Is Being Adapted to China’s Changing Global Position

81. Meeting U.S. Deterrence Requirements

82. A World in Flux

83. SIPRI compendium on Article 36 reviews

84. Cyber and Deterrence: The Military-Civil Nexus in High-End Conflict

85. The Deterrence and Assurance Conversation

86. Top Risks & Ethical Decisions 2017 with Ian Bremmer

87. Making sense of Europe’s Southern Neighbourhood: Main Geopolitical and Security Parameters

88. Illusions vs Reality: Twenty-Five Years of U.S. Policy Toward Russia, Ukraine, and Eurasia

89. A, B, C – Deployment of Civilian Capacities to International Peace Operations

90. Infrastructure, Attitude and Weather: Today's Threats to Supply Chain Security

91. The Evolution of Bonding Technology, Creditor Committees and the IMF

92. Patents and Internet Standards

93. The Cyber Financial Wars on the Horizon

94. The Use of Force Against the Islamic State

95. Regional Organizations and the UN Programme of Action on Small Arms

96. A New Development Agenda: Bridging the Development–Security Divide

97. A New Development Agenda: Bridging the Development–Security Divide

98. A New Development Agenda: Bridging the Development–Security Divide

99. A New Development Agenda: Bridging the Development–Security Divide

100. Measuring Illicit Arms Flows: SDG Target 16.4