1 |
Creative Commons |
Genocide and Accountability in Gaza: The Limits and Potential of International Law |
Prof Noura Erakat explores the significance of South Africa's application of the Convention on the Prevention and Punishment of the Crime of Genocide in the Gaza Strip before the International Court of Justice, and the Court's decision to hear the case. |
Noura Erakat |
14 Feb 2024 |
2 |
|
That's a Wrap! |
Resilience, cool communicators and space robots. This episode wraps a brilliant season of PTNPod, with Ari and Claudine's favourite 5 moments. |
Arianna Schuler Scott, Claudine Tinsman |
11 Jul 2022 |
3 |
|
Value & Benefits |
SPECIAL CONFERENCE EPISODE getting the inside scoop on UK Cyber Strategy. |
Arianna Schuler Scott, Chris Ensor, Bernard Parsons, Harmonie Toros |
04 Jul 2022 |
4 |
|
Relevant & Useful |
We discuss communication challenges and pipeline problems in cyber security. |
Arianna Schuler Scott, Claudine Tinsman, Andrew Martin, Louise Axon |
27 Jun 2022 |
5 |
|
Raising the Bar |
Surprising social media harms and the Online Safety Bill. This week we're talking about Claudine's research into long term harms of social media content and managing the 'mundane'. |
Arianna Schuler Scott, Claudine Tinsman |
24 Jun 2022 |
6 |
Creative Commons |
OxPeace 2022 Session 3: Part 4 |
Graeme Simpson presents "‘Countering the Violence of Exclusion’: From Policy to Delivery of the Youth, Peace and Security Agenda." |
Graeme Simpson |
10 Jun 2022 |
7 |
|
Power to the Ppl |
Data protection and making consent more of a conversation. Listen up, and prosper! |
Arianna Schuler Scott, Claudine Tinsman |
09 Jun 2022 |
8 |
Creative Commons |
Voice Hackers R Us |
We’re learning about speech interfaces and hacking home assistants with nonsense and wordplay. |
Arianna Schuler Scott, Claudine Tinsman, Mary Bispham |
28 May 2022 |
9 |
Creative Commons |
We are what we do |
Instead of passwords, what if computers used our high fives to log us in? |
Arianna Schuler Scott, Claudine Tinsman, Klaudia Krawiecka |
22 May 2022 |
10 |
Creative Commons |
Make or Break |
Join us as we explore how to describe trust, reputation and messiness using maths! |
Arianna Schuler Scott, Claudine Tinsman, Sean Sirur |
16 May 2022 |
11 |
Creative Commons |
Rethinking Risk |
Sometimes threats come from inside the system (content warning: intimate partner violence). |
Arianna Schuler Scott, Claudine Tinsman, Julia Slupska |
10 May 2022 |
12 |
Creative Commons |
The Kids aren’t OK |
Designing and building apps to protect children and young folk from data harms. |
Arianna Schuler Scott, Claudine Tinsman, Anirudh Ekambaranathan |
20 Apr 2022 |
13 |
Creative Commons |
Technospheres |
Political influence and the trading power of surveillance and censorship technologies. |
Arianna Schuler Scott, Claudine Tinsman, Valentin Weber |
20 Apr 2022 |
14 |
Creative Commons |
Networks of Hate |
Exploring how hate groups use, lose and abuse social media networks. |
Arianna Schuler Scott, Claudine Tinsman, Fatima Zahrah |
20 Apr 2022 |
15 |
Creative Commons |
The Strategies of Small States: Safeguarding Autonomy and Influencing Great Powers |
Dr Hillary Briffa looks at what characterises small states, their challenges, and the strategies they utilise to overcome these. She argues that small states can very successfully protect their autonomy and security, and exert considerable influence. |
Hillary Briffa |
12 Apr 2022 |
16 |
|
Illusions of Autonomy: why Europe cannot provide for its security if the United States pulls back |
How would Europe fare if the United States completely withdrew its security assurances and assistance? Dr Hugo Meijer argues that Europe would struggle to mount a collective, autonomous defence capacity vis-a-vis a resurgent Russia. |
Hugo Meijer |
08 Feb 2022 |
17 |
Creative Commons |
6. Europe in the World | The Europe’s Stories Podcast |
Ana and Lucas speak with Marianna Lovato and Olivier de France, the team’s experts on foreign policy and international politics. |
Marianna Lovato, Olivier de France, Ana Martins, Lucas Tse |
12 Oct 2021 |
18 |
|
Australian War Crimes in Afghanistan: National Mechanisms, Positive Complementarity and Command Responsibility |
Douglas Guilfoyle gives a talk as part of the Oxford Transitional Justice Research (OTJR) Seminar Series. |
Douglas Guilfoyle |
18 Mar 2021 |
19 |
|
Offensive Cyber, Ecology and the Competition for Security in Cyberspace: The UK’s Approach |
The Strategic Cyber Security model illustrates how offensive cyber capability has been operationalised as a critical component in the delivery of the UK's cyber security strategy |
Graham Fairclough |
14 May 2018 |
20 |
|
Strategy Evolves from apes to Artificial Intelligence |
Kenneth Payne explores the evolutionary basis of strategic behaviour, and assesses the impact of non-biological intelligence on the future of warfare. From chimpanzees to computers, via a dose of Clausewitz: hopefully something for everyone. |
Kenneth Payne |
05 Dec 2016 |
21 |
Creative Commons |
Arrangements of Convenience Among Violent Non-state Actors |
This talk will discuss how rebels, paramilitaries and criminals cooperate in borderland areas, and what this means for security. |
Annette Idler |
05 Jul 2016 |
22 |
Creative Commons |
The Business and Practice of Journalism seminar series - Spies and Journalists: The Impossible Relationship |
John Lloyd, Senior Research Fellow, Reuters Institute for the Study of Journalism, gives a talk for the Reuters Institute seminar series. Introduction by Chris Westcott |
John Lloyd |
10 Mar 2016 |
23 |
|
Japan's New Security Cooperation in Counter-Piracy Missions |
A talk by Professor Wilhelm Vosse, International Christian University, at the Nissan Institute. |
Wilhelm Vosse |
22 Jun 2015 |
24 |
Creative Commons |
OxPeace 2015: Key concerns in peace and security: building more peaceful and inclusive societies |
Sunil Suri gives a talk for Session C of the 2015 OxPeace conference; Peace and the proposed UN Sustainable Development Goals. |
Sunil Suri |
16 Jun 2015 |
25 |
|
Challenges Facing American Intelligence |
Professor John McLaughlin discusses Challenges facing American Intelligence |
John McLaughlin |
19 May 2015 |
26 |
|
The Principle of Mutual Recognition in the EU's Area of Freedom, Security and Justice |
Judge Koen Lenaerts, Vice President of the Court of Justice of the European Union and Professor of Law at the University of Leuven - 30 January 2015 |
Koen Lenaerts |
10 Apr 2015 |
27 |
|
What is a Cyber-Attack? |
What constitutes a cyber-attack and who conducts them? What are the risks to society? Sadie Creese will discuss these issues and explain research underway at Oxford to help in the detection and prevention of attacks. |
Sadie Creese |
03 Oct 2014 |
28 |
Creative Commons |
The rise and decline of a global security actor: UNHCR, refugee protection and security |
Public Seminar Series, Hilary term 2014. Seminar by Dr Anne Hammerstad (University of Kent), recorded on 12 March 2014 at the Oxford Department of International Development, University of Oxford. |
Anne Hammerstad |
26 Mar 2014 |
29 |
|
Keeping our secrets? Shaping internet technologies for the public good |
The Internet and related technologies, like smartphones and social networking services, are now a pervasive part of British life. Connected cars, smart cities, and ambient loos are coming soon. |
Ian Brown |
24 Mar 2014 |
30 |
Creative Commons |
Is the Indian Nuclear Tiger Changing Its Stripes? Data, Interpretation and Fact |
A talk by Dr Gaurav Kampani, Guest Researcher at the Norwegian Institute for Defence Studies (IFS), Oslo |
Gaurav Kampani |
21 Feb 2014 |
31 |
Creative Commons |
Rise of the Operaters |
Discussion of Internet surveillance, parliamentary oversight of security services, the Digital Economy Act, communications data, and government data sharing. |
Mike Bracken |
17 Jan 2014 |
32 |
|
Corporate water risk - confusion and ambiguity |
Alex Money, School of Geography and the Environment, gives a talk for the Water Security Seminar Series. |
Alex Money |
15 Nov 2013 |
33 |
|
What is the risk of drought in the Thames basin? |
Jim Hall, Environmental Change Institute, Oxford, gives a talk for the Water security seminar series. |
Jim Hall |
11 Nov 2013 |
34 |
Creative Commons |
NATO and European Security Dynamics: Military Capability and Political Will |
A talk given by Professor Janne Haaland Matlary of the University of Oslo and visiting fellow at the Changing Character of War Programme, Oxford, to the Global Directions research group at Merton College. |
Janne Haaland Matlary |
24 Jun 2013 |
35 |
Creative Commons |
Private Maritime Security and the Introduction of an International Regulatory Structure |
Peter Cook, Founder and Security Director of the Security Association for the Maritime Industry (SAMI), gives a talk on Maritime Security, organised by the Changing Character of War programme, Oxford University. |
Peter Cook |
04 Mar 2013 |
36 |
Creative Commons |
Panel 4: Old State, New Rules: New Logics of Popular Sovereignty and Subaltern Alternatives to the Egyptian 'Baltagi State' |
Paul Amar discusses subaltern forms of sovereignty and autonomous organisation that have been emerging in Egypt since the January uprising. |
Paul Amar |
25 May 2012 |
37 |
Creative Commons |
Dealing with uncertainties in UK energy policy: Some lessons from experience |
Jim Watson (Director, Sussex Energy Group) delivers a lecture as part of the 2012 Green Templeton College "Uncertainty..." lecture series. |
Jim Watson |
02 Mar 2012 |
38 |
|
The Need for Achieving Appropriate Information Sharing and Information Protection |
David Bray describes the Information Sharing Environment, exploring post-9/11 information sharing in the United States, and the efforts being made towards information sharing and national security. |
David Bray |
28 Feb 2012 |
39 |
|
Stabilisation, Security and Capacity Building - What the Business Schools and Sociologists might tell the Military |
Colonel Duncan Barley, British Army (Retired) gives a talk for the ELAC/CCW seminar series on 10th May 2011. |
Duncan Barley |
18 May 2011 |
40 |
Creative Commons |
The Battlefield from Afar: Independently Operating Systems and their Compatibility with the laws of Armed Conflict |
Markus Wagner, Associate Professor of Law, University of Miami Law School, gives a talk for the 2011 Hilary term ELAC/CCW seminar series. |
Markus Wagner |
21 Feb 2011 |
41 |
Creative Commons |
Being Humanitarian: Personal Morality and Political Project in Today's Wars |
Dr Hugo Slim, Visiting Fellow in the department of politics and international relations, gives a talk for the 2011 Hilary term ELAC/CCW seminar series on armed conflict. |
Hugo Slim |
21 Feb 2011 |
42 |
Creative Commons |
Contemporary Security Challenges (partial) |
Dr Paul Cornish (Chatham House) gives a talk for the Hiliary Term 2011 ELAC/CCW seminar series. Please note: this is only a partial recording. we apologise for the inconvenience this may cause. |
Paul Cornish |
21 Feb 2011 |
43 |
Creative Commons |
Oxford Program for the Future of Cities Part 2: Sustainable development and crime in the urban Caribbean |
David Howard (Lecturer in Sustainable Urban Development, University of Oxford) looks at larger concerns over social and spatial equity, conceptual approaches to sovereignty and the practical interpretation of sustainable forms of justice. |
David Howard |
15 Dec 2010 |
44 |
Creative Commons |
Sustainable development and crime in the urban Caribbean |
David Howard (Lecturer in Sustainable Urban Development, University of Oxford) looks at larger concerns over social and spatial equity, conceptual approaches to sovereignty and the practical interpretation of sustainable forms of justice. |
David Howard |
15 Dec 2010 |
45 |
Creative Commons |
Sustainable development and crime in the urban Caribbean |
David Howard (University Lecturer in Sustainable Urban Development, University of Oxford) looks at larger concerns over social and spatial equity, conceptual approaches to sovereignty and the practical interpretation of sustainable forms of justice. |
David Howard |
15 Dec 2010 |
46 |
|
Internet Governance and Regulation: The Future of the Internet - and How to Stop It |
What lies around the corner for the Internet .. and how do we avoid it? How can we study and affect the future of the Internet using the distributed power of the network itself? This is Jonathan Zittrain's inaugural lecture at the University of Oxford. |
Jonathan Zittrain |
09 Oct 2009 |
47 |
|
Internet Governance and Regulation: The Future of the Internet - and How to Stop It |
What lies around the corner for the Internet .. and how do we avoid it? How can we study and affect the future of the Internet using the distributed power of the network itself? This is Jonathan Zittrain's inaugural lecture at the University of Oxford. |
Jonathan Zittrain |
09 Oct 2009 |
48 |
|
Trusted Computing Rants, Regrets and Research |
How do we build trustworthy hardware, and how can we use that to increase the trustworthiness of broader distributed computation? Sean presents some things he's learned, some things he wishes he had done differently, and some things he'd still like to do. |
Sean Smith |
08 May 2009 |
49 |
|
Trusted Computing: Questioning What You Think You Know |
Eugene provokes us to question some assumptions related to computer architecture, the definitions of security, and how best to build trusted systems. Are current methods of defining security appropriate? How might we better design a system to be secured? |
Eugene H. Spafford |
08 May 2009 |