Articles

108 Items

A Life In The American Century Author: Joseph S. Nye Jr.

AUTHOR PHOTOGRAPH © MARTHA STEWART

Magazine Article - Newsweek

Don't 'Jeopardize Free Speech That Is Fundamental' to Harvard, Says Prof

    Author:
  • Meredith Wolf Schizer
| Jan. 24, 2024

In this Q&A, Joseph S. Nye talks about his advice for the interim and future president of Harvard in the wake of Claudine Gay's resignation, which countries should be highest on our radar to prevent the threat of nuclear war, what role the U.S. should play in the Russia-Ukraine war, the significance of U.S. alliances in the Middle East, and more.

Parties to the Nuclear Non-Proliferation Treaty gather in Geneva for NPT Prepcom 2018.

JWB/Wikimedia Commons

Journal Article - Contemporary Security Policy

Durable Institution Under Fire? The NPT Confronts Emerging Multipolarity

The regime built around the 1970 Treaty on the Non-Proliferation of Nuclear Weapons (NPT) has helped curtail the spread of nuclear arms for fifty years. In hindsight, it is remarkable only nine states possess the world’s most powerful weapon. The NPT achieved much success during Cold War bipolarity and U.S. unipolarity in its aftermath. But today, China’s rise and Russia’s resurgence have ushered in a new era of emerging multipolarity. Can the treaty withstand the potential challenges of this dynamic environment? There is a real risk that multipolarity may shake the scaffolding of the nonproliferation regime, presenting a significant test to the NPT’s durability. This article identifies four essential elements of the nonproliferation regime: widespread membership, adaptability, enforcement, and fairness. History suggests bipolarity and unipolarity in the international system largely sustained and promoted these NPT features. When international regimes lack such elements, it sharply curtails their long-term efficacy.

Ambassador Ivor Richard, left, of the United Kingdom, and U.S. Ambassador Andrew Young, right, raise their arms during vote, Friday, Nov. 4, 1977 at the United Nations Security Council.

(AP Photo/Dave Pickoff)

Journal Article - Quarterly Journal: International Security

Caught Red-Handed: How States Wield Proof to Coerce Wrongdoers

| Fall 2021

States frequently acquire proof that other states have violated norms. Yet, existing theories do not fully explain how states wield such proof to coerce wrongdoers. Four case studies of nuclear proliferation probe a novel theory of how states coerce norm violators by concealing, sharing privately, or publicizing proof of guilt.

(Economic Research Forum)

(Economic Research Forum)

Journal Article - Economic Research Forum

Is Oil Wealth Good for Private Sector Development?

| March, 2019

When do autocratic rulers in oil-producing countries support private sector development? We argue that the size of oil rents per capita has an important effect on ruler support for the rule of law, respect for private property rights, and other factors that promote private investment.

Great Decisions Cover

Foreign Policy Association

Journal Article - Foreign Policy Association

The State of the State Department and American Diplomacy

| Jan. 03, 2019

During the Trump administration, the usual ways of conducting diplomacy have been upended. Many positions in the State Department have never been filled, and meetings with foreign leaders such as Kim Jong-un and Vladimir Putin have been undertaken with little advance planning. What effect are these changes having now, and how will they affect ongoing relationships between the United States and its allies and adversaries?

Strategies of Nuclear Proliferation: How States Pursue the Bomb

AP

Journal Article - Quarterly Journal: International Security

Strategies of Nuclear Proliferation: How States Pursue the Bomb

| Winter 2016/17

Understanding which nuclear proliferation strategies are available to states and how to thwart them is crucial for global security. Analysis of the strategies chosen by potential proliferators, and particularly the history of India’s nuclear program, shows how states choose among four possible proliferation strategies: hedging, sprinting, hiding, and sheltered pursuit. Each strategy has vulnerabilities that can be exploited to prevent proliferation.