1 |
|
Offensive Cyber, Ecology and the Competition for Security in Cyberspace: The UK’s Approach |
The Strategic Cyber Security model illustrates how offensive cyber capability has been operationalised as a critical component in the delivery of the UK's cyber security strategy |
Graham Fairclough |
14 May 2018 |
2 |
|
Strategy Evolves from apes to Artificial Intelligence |
Kenneth Payne explores the evolutionary basis of strategic behaviour, and assesses the impact of non-biological intelligence on the future of warfare. From chimpanzees to computers, via a dose of Clausewitz: hopefully something for everyone. |
Kenneth Payne |
05 Dec 2016 |
3 |
Creative Commons |
Arrangements of Convenience Among Violent Non-state Actors |
This talk will discuss how rebels, paramilitaries and criminals cooperate in borderland areas, and what this means for security. |
Annette Idler |
05 Jul 2016 |
4 |
Creative Commons |
The Business and Practice of Journalism seminar series - Spies and Journalists: The Impossible Relationship |
John Lloyd, Senior Research Fellow, Reuters Institute for the Study of Journalism, gives a talk for the Reuters Institute seminar series. Introduction by Chris Westcott |
John Lloyd |
10 Mar 2016 |
5 |
|
Japan's New Security Cooperation in Counter-Piracy Missions |
A talk by Professor Wilhelm Vosse, International Christian University, at the Nissan Institute. |
Wilhelm Vosse |
22 Jun 2015 |
6 |
Creative Commons |
OxPeace 2015: Key concerns in peace and security: building more peaceful and inclusive societies |
Sunil Suri gives a talk for Session C of the 2015 OxPeace conference; Peace and the proposed UN Sustainable Development Goals. |
Sunil Suri |
16 Jun 2015 |
7 |
|
Challenges Facing American Intelligence |
Professor John McLaughlin discusses Challenges facing American Intelligence |
John McLaughlin |
19 May 2015 |
8 |
|
The Principle of Mutual Recognition in the EU's Area of Freedom, Security and Justice |
Judge Koen Lenaerts, Vice President of the Court of Justice of the European Union and Professor of Law at the University of Leuven - 30 January 2015 |
Koen Lenaerts |
10 Apr 2015 |
9 |
|
What is a Cyber-Attack? |
What constitutes a cyber-attack and who conducts them? What are the risks to society? Sadie Creese will discuss these issues and explain research underway at Oxford to help in the detection and prevention of attacks. |
Sadie Creese |
03 Oct 2014 |
10 |
Creative Commons |
The rise and decline of a global security actor: UNHCR, refugee protection and security |
Public Seminar Series, Hilary term 2014. Seminar by Dr Anne Hammerstad (University of Kent), recorded on 12 March 2014 at the Oxford Department of International Development, University of Oxford. |
Anne Hammerstad |
26 Mar 2014 |
11 |
|
Keeping our secrets? Shaping internet technologies for the public good |
The Internet and related technologies, like smartphones and social networking services, are now a pervasive part of British life. Connected cars, smart cities, and ambient loos are coming soon. |
Ian Brown |
24 Mar 2014 |
12 |
Creative Commons |
Is the Indian Nuclear Tiger Changing Its Stripes? Data, Interpretation and Fact |
A talk by Dr Gaurav Kampani, Guest Researcher at the Norwegian Institute for Defence Studies (IFS), Oslo |
Gaurav Kampani |
21 Feb 2014 |
13 |
Creative Commons |
Rise of the Operaters |
Discussion of Internet surveillance, parliamentary oversight of security services, the Digital Economy Act, communications data, and government data sharing. |
Mike Bracken |
17 Jan 2014 |
14 |
|
Corporate water risk - confusion and ambiguity |
Alex Money, School of Geography and the Environment, gives a talk for the Water Security Seminar Series. |
Alex Money |
15 Nov 2013 |
15 |
|
What is the risk of drought in the Thames basin? |
Jim Hall, Environmental Change Institute, Oxford, gives a talk for the Water security seminar series. |
Jim Hall |
11 Nov 2013 |
16 |
Creative Commons |
NATO and European Security Dynamics: Military Capability and Political Will |
A talk given by Professor Janne Haaland Matlary of the University of Oslo and visiting fellow at the Changing Character of War Programme, Oxford, to the Global Directions research group at Merton College. |
Janne Haaland Matlary |
24 Jun 2013 |
17 |
Creative Commons |
Private Maritime Security and the Introduction of an International Regulatory Structure |
Peter Cook, Founder and Security Director of the Security Association for the Maritime Industry (SAMI), gives a talk on Maritime Security, organised by the Changing Character of War programme, Oxford University. |
Peter Cook |
04 Mar 2013 |
18 |
Creative Commons |
Panel 4: Old State, New Rules: New Logics of Popular Sovereignty and Subaltern Alternatives to the Egyptian 'Baltagi State' |
Paul Amar discusses subaltern forms of sovereignty and autonomous organisation that have been emerging in Egypt since the January uprising. |
Paul Amar |
25 May 2012 |
19 |
Creative Commons |
Dealing with uncertainties in UK energy policy: Some lessons from experience |
Jim Watson (Director, Sussex Energy Group) delivers a lecture as part of the 2012 Green Templeton College "Uncertainty..." lecture series. |
Jim Watson |
02 Mar 2012 |
20 |
|
The Need for Achieving Appropriate Information Sharing and Information Protection |
David Bray describes the Information Sharing Environment, exploring post-9/11 information sharing in the United States, and the efforts being made towards information sharing and national security. |
David Bray |
28 Feb 2012 |
21 |
|
Stabilisation, Security and Capacity Building - What the Business Schools and Sociologists might tell the Military |
Colonel Duncan Barley, British Army (Retired) gives a talk for the ELAC/CCW seminar series on 10th May 2011. |
Duncan Barley |
18 May 2011 |
22 |
Creative Commons |
The Battlefield from Afar: Independently Operating Systems and their Compatibility with the laws of Armed Conflict |
Markus Wagner, Associate Professor of Law, University of Miami Law School, gives a talk for the 2011 Hilary term ELAC/CCW seminar series. |
Markus Wagner |
21 Feb 2011 |
23 |
Creative Commons |
Being Humanitarian: Personal Morality and Political Project in Today's Wars |
Dr Hugo Slim, Visiting Fellow in the department of politics and international relations, gives a talk for the 2011 Hilary term ELAC/CCW seminar series on armed conflict. |
Hugo Slim |
21 Feb 2011 |
24 |
Creative Commons |
Contemporary Security Challenges (partial) |
Dr Paul Cornish (Chatham House) gives a talk for the Hiliary Term 2011 ELAC/CCW seminar series. Please note: this is only a partial recording. we apologise for the inconvenience this may cause. |
Paul Cornish |
21 Feb 2011 |
25 |
Creative Commons |
Oxford Program for the Future of Cities Part 2: Sustainable development and crime in the urban Caribbean |
David Howard (Lecturer in Sustainable Urban Development, University of Oxford) looks at larger concerns over social and spatial equity, conceptual approaches to sovereignty and the practical interpretation of sustainable forms of justice. |
David Howard |
15 Dec 2010 |
26 |
Creative Commons |
Sustainable development and crime in the urban Caribbean |
David Howard (Lecturer in Sustainable Urban Development, University of Oxford) looks at larger concerns over social and spatial equity, conceptual approaches to sovereignty and the practical interpretation of sustainable forms of justice. |
David Howard |
15 Dec 2010 |
27 |
Creative Commons |
Sustainable development and crime in the urban Caribbean |
David Howard (University Lecturer in Sustainable Urban Development, University of Oxford) looks at larger concerns over social and spatial equity, conceptual approaches to sovereignty and the practical interpretation of sustainable forms of justice. |
David Howard |
15 Dec 2010 |
28 |
|
Internet Governance and Regulation: The Future of the Internet - and How to Stop It |
What lies around the corner for the Internet .. and how do we avoid it? How can we study and affect the future of the Internet using the distributed power of the network itself? This is Jonathan Zittrain's inaugural lecture at the University of Oxford. |
Jonathan Zittrain |
09 Oct 2009 |
29 |
|
Internet Governance and Regulation: The Future of the Internet - and How to Stop It |
What lies around the corner for the Internet .. and how do we avoid it? How can we study and affect the future of the Internet using the distributed power of the network itself? This is Jonathan Zittrain's inaugural lecture at the University of Oxford. |
Jonathan Zittrain |
09 Oct 2009 |
30 |
|
Trusted Computing Rants, Regrets and Research |
How do we build trustworthy hardware, and how can we use that to increase the trustworthiness of broader distributed computation? Sean presents some things he's learned, some things he wishes he had done differently, and some things he'd still like to do. |
Sean Smith |
08 May 2009 |
31 |
|
Trusted Computing: Questioning What You Think You Know |
Eugene provokes us to question some assumptions related to computer architecture, the definitions of security, and how best to build trusted systems. Are current methods of defining security appropriate? How might we better design a system to be secured? |
Eugene H. Spafford |
08 May 2009 |