Contemporary Security Policy

Papers
(The median citation count of Contemporary Security Policy is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
COVID-19 and emergency eLearning: Consequences of the securitization of higher education for post-pandemic pedagogy429
Why Russia attacked Ukraine: Strategic culture and radicalized narratives36
The International Health Regulations, COVID-19, and bordering practices: Who gets in, what gets out, and who gets rescued?33
How (not) to stop the killer robots: A comparative analysis of humanitarian disarmament campaign strategies29
Values, rights, and changing interests: The EU’s response to the war against Ukraine and the responsibility to protect Europeans29
War in Ukraine: Putin and the multi-order world28
A fragile public preference for cyber strikes: Evidence from survey experiments in the United States, United Kingdom, and Israel23
COVID-19 and privacy in the European Union: A legal perspective on contact tracing21
The future of UN peace operations: Principled adaptation through phases of contraction, moderation, and renewal20
The limitations of strategic narratives: The Sino-American struggle over the meaning of COVID-1920
UN peace operations in a multipolar order: Building peace through the rule of law and bottom-up approaches19
Peace operations are what states make of them: Why future evolution is more likely than extinction18
Lessons (to be) learned? Germany’s Zeitenwende and European security after the Russian invasion of Ukraine17
Protecting hidden infrastructure: The security politics of the global submarine data cable network15
Framers, founders, and reformers: Three generations of proxy war research13
The ambiguity of hybrid warfare: A qualitative content analysis of the United Kingdom's political–military discourse on Russia's hostile activities9
Stability abroad, instability at home? Changing UN peace operations and civil–military relations in Global South troop contributing countries9
Not a blood alliance anymore: China’s evolving policy toward UN sanctions on North Korea9
Externalizing EU crisis management: EU orchestration of the OSCE during the Ukrainian conflict8
Harnessing protest potential: Russian strategic culture and the colored revolutions8
Differentiated cooperation as the mode of governance in EU foreign policy8
External drivers of EU differentiated cooperation: How change in the nuclear nonproliferation regime affects member states alignment7
War in Ukraine7
Informal groupings as types of differentiated cooperation in EU foreign policy: the cases of Kosovo, Libya, and Syria7
Filling the void: The Asia-Pacific problem of order and emerging Indo-Pacific regional multilateralism7
A theory of nuclear disarmament: Cases, analogies, and the role of the non-proliferation regime7
NPT as an antifragile system: How contestation improves the nonproliferation regime7
Politics is not everything: New perspectives on the public disclosure of intelligence by states6
Durable institution under fire? The NPT confronts emerging multipolarity6
Imperialism, supremacy, and the Russian invasion of Ukraine6
Conflict management or conflict resolution: how do major powers conceive the role of the United Nations in peacebuilding?6
Why language matters: Shaping public risk tolerance during deterrence crises6
Great power identity in Russia’s position on autonomous weapons systems6
India’s recognition as a nuclear power: A case of strategic cooptation6
Not by NPT alone: The future of the global nuclear order5
The dual-use security dilemma and the social construction of insecurity5
Utility-based predictions of military escalation: Why experts forecasted Russia would not invade Ukraine5
Emerging technology and nuclear security: What does the wisdom of the crowd tell us?5
Combined differentiation in European defense: tailoring Permanent Structured Cooperation (PESCO) to strategic and political complexity5
Responding to the crisis in United Nations peace operations5
Redefining deterrence in cyberspace: Private sector contribution to national strategies of cyber deterrence5
Drones have boots: Learning from Russia’s war in Ukraine5
Reconsidering the humanitarian space: Complex interdependence between humanitarian and peace negotiations in Syria4
Risk acceptance and offensive war: The case of Russia under the Putin regime4
Emulating underdogs: Tactical drones in the Russia-Ukraine war4
Addressing the security needs of adolescent girls in protracted crises: Inclusive, responsive, and effective?4
Defense treaties increase domestic support for military action and casualty tolerance: Evidence from survey experiments in the United States4
Everyday visuality and risk management: Representing (in)security in UN peacekeeping4
Who lost Ethiopia? The unmaking of an African anchor state and U.S. foreign policy4
Strategic narratives and the multilateral governance of cyberspace: The cases of European Union, Russia, and India4
The unintended consequences of UN sanctions: A qualitative comparative analysis4
Authoritarian multilateralism in the global cyber regime complex: The double transformation of an international diplomatic practice4
Predictors of support for a ban on killer robots: Preventive arms control as an anticipatory response to military innovation3
Between EU candidacy and independent diplomacy: third country alignment with EU positions at the OSCE3
Power to the have-nots? The NPT and the limits of a treaty hijacked by a “power-over” model3
Roots of Ukrainian resilience and the agency of Ukrainian society before and after Russia’s full-scale invasion3
Global Britain in the grey zone: Between stagecraft and statecraft3
When is it legitimate to abandon the NPT? Withdrawal as a political tool to move nuclear disarmament forward3
Experimental differentiation as an innovative form of cooperation in the European Union: Evidence from the Nordic Battlegroup3
Omnibalancing and international interventions: How Chad’s president Déby benefitted from troop deployment3
Backwards from zero: How the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity3
The regulation of private military and security companies: Analyzing power in multi-stakeholder initiatives3
Career connections: transnational expert networks and multilateral cybercrime negotiations3
The limits of strategic partnerships: Implications for China’s role in the Russia-Ukraine war3
The pervasive informality of the international cybersecurity regime: Geopolitics, non-state actors and diplomacy3
The Chinese failure to disarm North Korea: Geographical proximity, U.S. unipolarity, and alliance restraint3
The role of insurers in shaping international cyber-security norms about cyber-war3
War in the borderland through cyberspace: Limits of defending Ukraine through interstate cooperation3
Beyond deterrence: Reconceptualizing denial strategies and rethinking their emotional effects3
0.01860499382019