Publications

Find detailed analysis and policy recommendations in our reports and analysis.

FILTER
Type
Location
Themes
strategic-security-analysesStrategic Security Analyses
Weapons Systems Supply and Operational or Logistical Support under the PSSA
strategic-security-analysesStrategic Security Analyses
Synergies between the Arms Trade Treaty and the Wassenaar Arrangement
strategic-security-analysesStrategic Security Analyses
The Arms Trade Treaty (ATT) and Asia’s major power defiance
strategic-security-analysesStrategic Security Analyses
Advancing Inclusive Mediation Through the Lens of Leadership
strategic-security-analysesStrategic Security Analyses
The South Asian Nuclear Posture: A Vicious Nuclear Arms Race
strategic-security-analysesStrategic Security Analyses
Perils of Lethal Autonomous Weapons Systems Proliferation: Preventing Non-State Acquisition
strategic-security-analysesStrategic Security Analyses
Business and Private Diplomacy: A Potential Catalyst for Sustainable Peace
strategic-security-analysesStrategic Security Analyses
The Increasing Importance of Hybrid Politics in Europe: Cyber Power is Changing the Nature of Politics
strategic-security-analysesStrategic Security Analyses
Asian water security: a present and future test
strategic-security-analysesStrategic Security Analyses
Women in Mediation: Connecting the Local and Global
strategic-security-analysesStrategic Security Analyses
Water security, conflict and cooperation
strategic-security-analysesStrategic Security Analyses
The Criminal-Jihadist: Insights into Modern Terrorist Financing
strategic-security-analysesStrategic Security Analyses
The relevance of the cold war today
strategic-security-analysesStrategic Security Analyses
History Politicised: Russia, Ukraine and the West
strategic-security-analysesStrategic Security Analyses
When history meets policy: understanding the past to shape the future
strategic-security-analysesStrategic Security Analyses
Achieving global health security: the implementation of international health regulations
strategic-security-analysesStrategic Security Analyses
Why should we care about 3D-printing and what are potential security implications?
strategic-security-analysesStrategic Security Analyses
Cyber Jihad
strategic-security-analysesStrategic Security Analyses
Shadow networks: the growing nexus of terrorism and organised crime