Skip to content
NUPI skole

Defence and security

What are the central questions related to defence and security?
Event
12:00 - 15:30
NUPI
Engelsk
Afghanistan-seminar_NTB_16-9_web.png
Event
12:00 - 15:30
NUPI
Engelsk
11. Oct 2023
Event
12:00 - 15:30
NUPI
Engelsk

Human Rights Violations in the Taliban’s Afghanistan

HRRL presents the report "Revenge Killings and Other Serious Human Rights Violations in Afghanistan in the Aftermath of the Taliban’s Seizure of Power." The findings will be discussed by Afghanistan experts such as Richard Bennett, UN Special Rapporteur on Human Rights in Afghanistan, and HRW researcher Fereshta Abbasi.

Publications
Publications
Research paper
Malte Brosig, Friedrich Plank, Yf Reykers

Governance Through Regime Complexity: What Role for the EU in the African Security Regime Complex?

The international response to armed conflict in Africa often takes the form of a regime complex characterized by institutional proliferation, overlap, unclear hierarchies, and multiple interconnections. At the same time, the course of conflict is hardly predictable. In such an environment, how can component units (institutional fora) of a regime complex effectively govern through complexity? We explore this question by focusing on the EU as an important actor within regime complexes. Building on the regime complexity literature and complexity theory, we identify four conditions. We argue that actors who operate as resource hubs, create complementarity, support system self‐organization, and practice adaptive forms of peacebuilding are best placed to manage regime complexity. Empirically we probe these assumptions in the context of the Sahelian security regime complex and the role the EU is playing in it.

  • Defence
  • Security policy
  • Africa
  • Governance
  • The EU
PG.PNG
  • Defence
  • Security policy
  • Africa
  • Governance
  • The EU
Media
Media
Media

Experter från tre Natoländer: Därför vill vi ha Sverige som medlem

  • Defence
  • Security policy
  • NATO
  • The Nordic countries
SVT Nyheter.PNG
  • Defence
  • Security policy
  • NATO
  • The Nordic countries
Media
Media
Media

Bodø kan få Nato-ansvar

  • Defence
  • NATO
Dagsrevyen2.PNG
  • Defence
  • NATO
Media
  • Defence
  • Security policy
Publications
Publications

Ukeslutt

  • Defence
  • Security policy
Ukeslut.PNG
  • Defence
  • Security policy
Publications
Publications
Scientific article

Anarchy is a Bridge: Russia and China are Pushing NATO and Japan Together

After nearly 70 years of distant relations, security ties between NATO and Japan are flourishing. A number of important initiatives have recently been adopted, including high-level political dialogues, joint military training, and cooperation in science, technology, and cyber security. This article considers recent developments in NATO-Japan relations and in particular their origins, drivers and implications.

  • Defence
  • Security policy
  • NATO
  • Asia
war.PNG
  • Defence
  • Security policy
  • NATO
  • Asia
Publications
Publications
Scientific article

Digital Supply Chain Dependency and Resilience

While a growing body of literature addresses how states increasingly aim to secure their digital domains and mitigate dependencies, less attention has been paid to how infrastructural and architectural configurations shape their ability to do so. This paper provides a novel approach to studying cyber security and digital dependencies, paying attention to how the everyday business decisions by private companies affect states’ ability to ensure security. Every mobile application relies on a multitude of microservices, many of which are provided by independent vendors and service providers operating through various infrastructural configurations across borders in an a-territorial global network. In this paper, we unpack such digital supply chains to examine the technical cross-border services, infrastructural configurations, and locations of various microservices on which popular mobile applications depend. We argue that these dependencies have differing effects on the resilience of digital technologies at the national level but that addressing these dependencies requires different and sometimes contradictory interventions. To study this phenomenon, we develop a methodology for exploring this phenomenon empirically by tracing and examining the dispersed and frequently implicit dependencies in some of the most widely used mobile applications. To analyse these dependencies, we record raw traffic streams at a point in time seen across various mobile applications. Subsequently locating these microservices geographically and to privately owned networks, our study maps dependencies in the case studies of Oslo, Barcelona, Paris, Zagreb, Mexico City, and Dublin.

  • Cyber
cycon.PNG
  • Cyber
Event
15:00 - 16:00
Microsoft Teams
Engelsk
230823_Taliban.png
Event
15:00 - 16:00
Microsoft Teams
Engelsk
23. Aug 2023
Event
15:00 - 16:00
Microsoft Teams
Engelsk

WEBINAR: The Return of the Taliban: Afghanistan after the Americans left

How stable is the current Taliban regime in Afghanistan?

Articles
News
Articles
News

PODCAST: AI and geopolitics

“Every tool can become a weapon,” notes Vice Chair and President of Microsoft. “It will take not just responsible companies, but law and regulation to manage this properly.”
  • Security policy
  • Cyber
  • Diplomacy
  • Global governance
121 - 130 of 1308 items