Articles

31 Items

workmen label the priority packages of Salk polio vaccine for distribution

AP/Ernest K. Bennett

Journal Article - Journal of Applied History

To Boldly Remember Where We Have Already Been

| 2020

This article revisits the Cutter Incident in the United States in April 1955 when mass-produced doses of polio vaccine containing insufficiently inactivated (killed) live polio virus were released to the U.S. public. The Cutter Incident also affected subsequent vaccine development and these lessons remain relevant in the international quest to create a rapidly developed vaccine for COVID-19. The Cutter Incident shows how things can go wrong when a vaccine is manufactured in haste and without adequate safety precautions during mass-production

Chernobyl welcome sign

Wikimedia CC/Jorge Franganillo

Journal Article - Futures

Accumulating Evidence Using Crowdsourcing and Machine Learning: A Living Bibliography about Existential Risk and Global Catastrophic Risk

    Authors:
  • Gorm E. Shackelford
  • Luke Kemp
  • Catherine Rhodes
  • Lalitha Sundaram
  • Seán S. ÓhÉigeartaigh
  • Simon Beard
  • Haydn Belfield
  • Shahar Avin
  • Dag Sørebø
  • Elliot M. Jones
  • John B. Hume
  • David Price
  • David Pyle
  • Daniel Hurt
  • Theodore Stone
  • Harry Watkins
  • Lydia Collas
  • Bryony C. Cade
  • Thomas Frederick Johnson
  • Zachary Freitas-Groff
  • David Denkenberger
  • Michael Levot
  • William J. Sutherland
| February 2020

The study of existential risk — the risk of human extinction or the collapse of human civilization — has only recently emerged as an integrated field of research, and yet an overwhelming volume of relevant research has already been published. To provide an evidence base for policy and risk analysis, this research should be systematically reviewed. In a systematic review, one of many time-consuming tasks is to read the titles and abstracts of research publications, to see if they meet the inclusion criteria. The authors show how this task can be shared between multiple people (using crowdsourcing) and partially automated (using machine learning), as methods of handling an overwhelming volume of research.

petri dishes

AP/Federica Narancio

Journal Article - European Review

Human Heredity Now and in the Future

| February 2019

The distinctive human characteristic of curiosity, once liberated from belief in supernatural causes of natural phenomena, has led with increasing speed to the brink of a world in which humanity will increasingly direct its own genetic endowment, raising the question of what we most value in being human and how to keep faith with it.

Journal Article - Cold War History

'Wean Them Away from French Tutelage': Franco-Indian Nuclear Relations and Anglo-American Anxieties During the Early Cold War, 1948–1952

| October 2015

Based on multi-archival research, this article explores the significance of Franco-Indian nuclear relations against the backdrop of Anglo-American endeavours to censor information related to atomic energy and to secure control of strategic minerals during the early Cold War.

Shale gas drilling station in a village in the district of Krynica Krasnostaw in Lublin province, Poland, 17 September 2011.

CC-BY-SA-3.0

Journal Article - Science and Engineering Ethics

Contested Technologies and Design for Values: The Case of Shale Gas

    Authors:
  • Marloes Dignum
  • Aad Correljé
  • Eefje Cuppen
  • Udo Pesch
| July 2015

The introduction of new energy technologies may lead to public resistance and contestation. It is often argued that this phenomenon is caused by an inadequate inclusion of relevant public values in the design of technology. In this paper, the authors examine the applicability of the value sensitive design (VSD) approach.

Journal Article - Bulletin of the Atomic Scientists

Uranium Supplies: A Hitch to China’s Nuclear Energy Plans? Or not?

| May 6, 2015

China will triple the number of nuclear power plants it has in operation by 2020 according to official plans, and the country’s nuclear fleet will increase 20-fold by 2050 under some not-yet-approved proposals. But how and where will China get the uranium to fuel them all? Will China need to resort to breeder reactors and reprocessing, with all the proliferation problems they incur? Or is there another way? In this journal article for the Bulletin of the Atomic Scientists, Hui Zhang suggests that between China’s domestic uranium mining, uranium purchased on the international market, and uranium mined by Chinese-owned companies overseas, China could meet even the most ambitious target, thus avoiding the troublesome and dangerous path of reprocessing.

Journal Article - China Nuclear Power

Securing Chinese Nuclear Power Development: Further Strengthening Nuclear Security

| September, 2014

Chinese President Xi Jinping addresses China’s new concept of nuclear security with four “equal emphasis” at the third Nuclear Security Summit, and makes four commitments to strengthen nuclear security in the future. To convert President Xi’s political commitments into practical, sustainable reality, China should take further steps to install a complete, reliable, and effective security system to ensure that all its nuclear materials and nuclear facilities are effectively protected against the full spectrum of plausible terrorist and criminal threats. This paper suggests the following measures be taken to improve China’s existing nuclear security system, including updating and clarifying the requirements for a national level DBT; updating and enforcing existing regulations; further promoting nuclear security culture; balancing the costs of nuclear security, and further strengthening international cooperation on nuclear security.

Security detail overseeing the secure transportation of highly enriched uranium to Russia in Poland, October 2010

USA.gov

Journal Article - Journal of Nuclear Materials Management

Preventing Insider Theft: Lessons from the Casino and Pharmaceutical Industries

| June 17, 2013

Through structured interviews and a literature review, we assess which approaches to protection against insider thefts in the casino and pharmaceutical industries could be usefully applied to strengthen protections against insider theft in the nuclear industry, where insider thefts could have very high consequences.