Elcano Royal Institute
Skip to content
Elcano Royal Institute Global Presence
  • CORPORATE PARTNERS PROGRAMME
  • Subscribe
  • ES
  • EN
  • ES
  • EN
  • Topics
    • Globalization, development and governance
    • International Security
    • Democracy and citizenship
    • Climate and energy
    • Technology and economics
    • Future of Europe
    • Latin America
    • China, the US and the new world order
    • Challenges and opportunities in the neighbourhood
    • Influence and image of Spain
    • Specials
  • Publications
    • Expert Comments
    • Analyses
    • Policy Papers
    • Monographs
    • Reports
    • Surveys
    • Working Papers
    • Newsletters
  • Experts
    • Elcano in Brussels
  • Projects
  • Events
  • About Elcano
    • Our mission and values
    • Juan Sebastián de Elcano
    • Corporate governance
      • Board of Trustees
      • Executive Committee
      • Protector Partners
      • Collaborating Partners
      • Emeritus Trustees
    • ElcanoNet
      • Scientific Council
      • Advisory Council
      • Think tank networks
    • Research
      • Research agenda
      • Action Plan
      • Working Groups
    • The Elcano team
    • Talents and Elcano Alumni Network
    • Transparency
      • Annual Report
      • Bylaws
      • Finances
      • Good practices
Home / Themes / International Security / Page 10

International Security

Person holding a mobile phone on Black Friday shopping. Photo: CardMapr.nl (@cardmapr)
International Security
Analysis

Understanding public reactions to cybersecurity incidents

By Miguel Alberto Gomez // Posted on 21 Jun 2021
Read more
Young person with cell phone. Photo: Warren Wong (@wflwong)
International Security
Analysis

Social ties and Jihadist terrorism: what turns violent radicalisation into terrorist involvement?

By Álvaro Vicente // Posted on 24 May 2021
Read more
NATO Training Mission in Kabul (2011). Photo: U.S. Army photo by Bill Putnam/Released – NATO Training Mission-Afghanistan (CC BY-SA 2.0). Elcano Blog
Global Spectator
Experts Comment

From Afghanistan to China: the pathology of victory

By Andrés Ortega // Posted on 04 May 2021
Read more
Alaa Salah, Civil Society Activist and Community Leader from Sudan, addresses the Security Council meeting on Women, Peace and Security in 2019. Photo: UN Women (CC BY-NC-ND 2.0)
International Security
Analysis

Rekindling the Agenda on Women, Peace and Security: can the EU lead by example?

By Jessica Almqvist // Posted on 23 Mar 2021
Read more
St Pauls Churchyard at night (London, England, UK). Photo: Tudor Panait (@tudor_panait)
International Security
Analysis

The National Cyber Force: directions and implications for the UK

By Danny Steed // Posted on 09 Feb 2021
Read more
Great power rivalry in the Middle East. Rivalry in the Middle East, collage. Photo: Emma Muñoz Descalzo / ©Real Instituto Elcano.
International Security
Experts Comment

Great power rivalry in the Middle East

By Wojciech Michnik // Posted on 18 Jan 2021
Read more
Blue led panel. Photo: Adi Goldstein (@adigold1)
International Security
Analysis

Hacking Back unpacked: an eye for an eye? Not so fast

By Stefan Soesanto // Posted on 14 Jan 2021
Read more
Flags member countries at the NATO Headquarters in Brussels. Photo: NATO North Atlantic Treaty Organization (CC BY-NC-ND 2.0)
International Security
Analysis

Horizon 2030: assessing the impact of socio-economic and governance issues on the future of the MENA Region

By Chloe Berger // Posted on 13 Jan 2021
Read more
Abstract view of CPU Heat Sink. Photo: Michael Dziedzic (@lazycreekimages)
International Security
Analysis

Artificial Intelligence and Cybersecurity: a promising but uncertain future

By Matteo E. Bonfanti // Posted on 09 Dec 2020
Read more
Person walking along corridors. King's Cross, London (UK). Photo: Graeme Worsfold (@worsfold)
Future of Europe
Analysis

Implications of the UK’s Russia Report for the next National Cyber Security Strategy

By Danny Steed // Posted on 13 Oct 2020
Read more
Cibersecurity in Latin America and the Caribean
International Security
Analysis

Balancing between giants, Latin-America’s international cybersecurity position

By Nathalie Van Raemdonck // Posted on 14 Sep 2020
Read more
China in the security conundrum of the eastern Mediterranean. Chinese Development Notice at Lake Assal (Djibouti). Photo: Michael Edward Walsh (CC BY-NC-ND 2.0)
International Security
Experts Comment

A new kid on the block? China in the security conundrum of the eastern Mediterranean

// Posted on 24 Jul 2020
Read more

Tags

  • European Union
  • United States
  • International relations
  • Geopolitics
  • International economics
  • Security and defence
  • China
  • Russia
  • International conflicts
  • Digitalisation
  • European integration
  • Spain
  • Governance
  • Public opinion
  • Elections

Latest Publications

Composition with the world map of the global presence ranking with the results of the, and a scientific vector illustration with wave flows and node networks, in gradient colours from violet to cyan.

The Elcano Global Presence Index 2025 reflects a tougher and more fragmented globalisation – and a strongly growing Spain

May 22, 2025

Composition with the world map of the global presence ranking with the results of the, and a scientific vector illustration with wave flows and node networks, in gradient colours from violet to cyan.

Globalisation in transition, from interdependence to geopolitical rivalry: analysing the results of the 2025 edition of the Elcano Global Presence Index

May 22, 2025

Human silhouettes in front of a brightly lit Unites States flag screen. US

Roundtable ‘Values, ideas, culture: the end of US soft power?’

May 14, 2025

  • Previous Page
  • Page 1
  • …
  • Page 8
  • Page 9
  • Page 10
  • Page 11
  • Page 12
  • …
  • Page 31
  • Next Page
  • Contact
  • Legal notice
  • Privacy Policy & Cookies
  • Credits
  • FAQs
  • Accessibility
  • Jobs

Follow us on social media:

Manage Cookie Consent
To provide the best experiences, we use technologies such as cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting, or withdrawing consent, may adversely affect certain features and functions..
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
The technical storage or access that is used exclusively for statistical purposes. El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
The technical storage or access is necessary to create user profiles to send advertising, or to track the user on a website or on several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View settings
{title} {title} {title}