Nuclear Issues

33 Items

Chernobyl welcome sign

Wikimedia CC/Jorge Franganillo

Journal Article - Futures

Accumulating Evidence Using Crowdsourcing and Machine Learning: A Living Bibliography about Existential Risk and Global Catastrophic Risk

    Authors:
  • Gorm E. Shackelford
  • Luke Kemp
  • Catherine Rhodes
  • Lalitha Sundaram
  • Seán S. ÓhÉigeartaigh
  • Simon Beard
  • Haydn Belfield
  • Shahar Avin
  • Dag Sørebø
  • Elliot M. Jones
  • John B. Hume
  • David Price
  • David Pyle
  • Daniel Hurt
  • Theodore Stone
  • Harry Watkins
  • Lydia Collas
  • Bryony C. Cade
  • Thomas Frederick Johnson
  • Zachary Freitas-Groff
  • David Denkenberger
  • Michael Levot
  • William J. Sutherland
| February 2020

The study of existential risk — the risk of human extinction or the collapse of human civilization — has only recently emerged as an integrated field of research, and yet an overwhelming volume of relevant research has already been published. To provide an evidence base for policy and risk analysis, this research should be systematically reviewed. In a systematic review, one of many time-consuming tasks is to read the titles and abstracts of research publications, to see if they meet the inclusion criteria. The authors show how this task can be shared between multiple people (using crowdsourcing) and partially automated (using machine learning), as methods of handling an overwhelming volume of research.

Journal Article - Cold War History

'Wean Them Away from French Tutelage': Franco-Indian Nuclear Relations and Anglo-American Anxieties During the Early Cold War, 1948–1952

| October 2015

Based on multi-archival research, this article explores the significance of Franco-Indian nuclear relations against the backdrop of Anglo-American endeavours to censor information related to atomic energy and to secure control of strategic minerals during the early Cold War.

Journal Article - Bulletin of the Atomic Scientists

Uranium Supplies: A Hitch to China’s Nuclear Energy Plans? Or not?

| May 6, 2015

China will triple the number of nuclear power plants it has in operation by 2020 according to official plans, and the country’s nuclear fleet will increase 20-fold by 2050 under some not-yet-approved proposals. But how and where will China get the uranium to fuel them all? Will China need to resort to breeder reactors and reprocessing, with all the proliferation problems they incur? Or is there another way? In this journal article for the Bulletin of the Atomic Scientists, Hui Zhang suggests that between China’s domestic uranium mining, uranium purchased on the international market, and uranium mined by Chinese-owned companies overseas, China could meet even the most ambitious target, thus avoiding the troublesome and dangerous path of reprocessing.

Journal Article - China Nuclear Power

Securing Chinese Nuclear Power Development: Further Strengthening Nuclear Security

| September, 2014

Chinese President Xi Jinping addresses China’s new concept of nuclear security with four “equal emphasis” at the third Nuclear Security Summit, and makes four commitments to strengthen nuclear security in the future. To convert President Xi’s political commitments into practical, sustainable reality, China should take further steps to install a complete, reliable, and effective security system to ensure that all its nuclear materials and nuclear facilities are effectively protected against the full spectrum of plausible terrorist and criminal threats. This paper suggests the following measures be taken to improve China’s existing nuclear security system, including updating and clarifying the requirements for a national level DBT; updating and enforcing existing regulations; further promoting nuclear security culture; balancing the costs of nuclear security, and further strengthening international cooperation on nuclear security.

Security detail overseeing the secure transportation of highly enriched uranium to Russia in Poland, October 2010

USA.gov

Journal Article - Journal of Nuclear Materials Management

Preventing Insider Theft: Lessons from the Casino and Pharmaceutical Industries

| June 17, 2013

Through structured interviews and a literature review, we assess which approaches to protection against insider thefts in the casino and pharmaceutical industries could be usefully applied to strengthen protections against insider theft in the nuclear industry, where insider thefts could have very high consequences.

Presentation

The Evolution of the IAEA: Using Nuclear Crises as Windows of Opportunity (or Not)

| March 13, 2013

This seminar considered how the International Atomic Energy Agency (IAEA) has reacted to nuclear crises. The IAEA often appears not just to have weathered such crises, but to have successfully leaped through windows of opportunity presented by them. This has resulted in periodic expansions of its mandate, capabilities, and resources. The 2011 Fukushima disaster appears to be a puzzling exception, raising the question of what concatenation of factors needs to be present for the IAEA to take advantage of nuclear crises.

Nuclear Fuel Rod Assembly

NEAMS/DOE Photo

Journal Article - Environmental Science and Technology

Expert Judgments about RD&D and the Future of Nuclear Energy

| 2012

Probabilistic estimates of the cost and performance of future nuclear energy systems under different scenarios of government research, development, and demonstration (RD&D) spending were obtained from 30 U.S. and 30 European nuclear technology experts. The majority expected that such RD&D would have only a modest effect on cost, but would improve performance in other areas, such as safety, waste management, and uranium resource utilization. The U.S. and E.U. experts were in relative agreement regarding how government RD&D funds should be allocated, placing particular focus on very high temperature reactors, sodium-cooled fast reactors, fuels and materials, and fuel cycle technologies.

Presentation

Cyber Disorders: Rivalry and Conflict in a Global Information Age

| May 3, 2012

The risks posed by the proliferation of cyber weapons are gaining wide recognition among security planners. Yet the general reaction of scholars of international relations has been to neglect the cyber peril owing to its technical novelties and intricacies. This attitude amounts to either one or both of two claims: the problem is not of sufficient scale to warrant close inspection, or it is not comprehensible to a non-technical observer. This seminar challenged both assertions.