Melvyn Levitsky was featured in a recent Christian Science Monitor article on whether former Utah governor and Obama-era ambassador to China Jon Huntsman would be an effective choice as the U.S. ambassador to Russia.
The article, titled “Jon...
A new study by Benjamin Edwards, Alexander Furnas, Stephanie Forrest, and Robert Axelrod, titled “Strategic aspects of cyberattack, attribution and blame” was published on February 27 in the Proceedings of the National Academy of...
The National Academy of Sciences has appointed Joy Rohde to serve on an 18-member committee tasked with carrying out a two-year study sponsored by the Office of the Directorate of National Intelligence (ODNI).
The study, titled “Social and...
Engaging with youth involved in or susceptible to violent extremism is key in helping the U.S. government understand—and combat—terrorist groups such as Al Qaeda and the Islamic State, according to a position paper, "Challenges in researching...
After the election of President Donald Trump, many writers have sought to understand how his campaign promises will translate into policy. One such exploration, "Wandering foreign policy leaves world on alert," by Claudia Trevisan from the Brazilian...
We are pleased to announce a new director of the University of Michigan's Science, Technology, and Public Policy (STPP) graduate certificate program and to welcome applications from interested students. Associate Professor Shobita Parthasarathy,...
In the lead up to the UN Climate Change Conference in December, the U.S. will organize a task force to incorporate climate and security analysis into its foreign policy agenda.
Secretary of State John Kerry announced the new group at a speech in...
In an op-ed titled "Why rush to hold kids back?" published by The Detroit News on October 29th, Brian Jacob and Michael Lombardo applaud a new state legislature bill proposing Michigan’s first comprehensive reading program.“One provision in the...
Robert Axelrod and postdoctoral research fellow Rumen Iliev have created a mathematical model to better understand internet security risks by analyzing when attackers are most motivated to exploit vulnerabilities in a target computer system. By...