You are here

Publications

As part of its mission to find a common security culture for the EU, to help develop and project the CFSP, and to enrich Europe’s strategic debate, the Institute regularly releases publications on the topics and regions at the core of the Union's work.

The Institute’s flagship publication is its series of Chaillot Papers, which are based on focused, in-depth research. The EUISS also publishes a Yearbook (YES), Reports, and shorter Briefs.

  • Download document
    02December 2016

    The number of popular protests in Africa has increased significantly since the mid-2000s, reaching its peak in recent years. To what extent can this surge challenge sitting governments or even be the harbinger of broader social and political change on the continent?

  • Download document
    24November 2016

    The EU and China have long sought to cooperate in and with Africa. Illegal migration to Europe, China’s growing commercial investments and terrorists looking for safe haven in Africa bind European, Chinese and African interests. The proliferation of these challenges beyond African borders is now driving the three parties closer together.

  • Download document
    24November 2016

    China is increasingly engaged in a combination of investments and infrastructure development, forum-building and political messaging around the world with various sub-regional groupings of countries. Could this potentially challenge the role of the EU in Europe in the long term?

  • Download document
    18November 2016

    Artificial intelligence and autonomous systems are already disruptive technologies in civilian sectors, and the same is likely to happen when they become more prevalent in the military realm. This Alert focuses on the non-lethal applications of artificial intelligence and autonomous systems, and how they might impact military capabilities and alter command structures down the road.

  • Download document
    18November 2016

    Europe’s shifting security landscape demands concrete action if the EU is to play a role in protecting the continent. This Alert takes a look at some of the pilot projects being launched to deliver tangible results on security and defence.

  • Download document
    10November 2016

    Because of the intertwining of internal and external security matters, the EU’s model of dealing with crisis is being challenged. This Brief looks at how integrating different approaches and distinct practises across the EU may come to represent the key change for policymakers.

  • Download document
    10November 2016

    Civilian CSDP missions were downsized in 2016, paradoxically at a time when security needs are growing – with threats largely of a non-military nature. This Brief shows how these changes call for renewed investment in civilian CSDP so that it can find its place in the evolving global crisis management architecture.

  • Download document
    09November 2016

    This report is the result of a closed-door workshop and a public conference on 'Prospects for EU–India Security Cooperation' held in September 2016 in New Delhi by Chatham House, the EU Institute for Security Studies, and the Observer Research Foundation. It explores the scope for EU-India engagement on three major security issues: West Asia (Middle East), maritime security, and counter-terrorism and radicalisation.

  • Download document
    09November 2016

    Since lifting its historic ban on arms exports in April 2014, Japan has faced an obstacle-ridden path in becoming an arms exporter. This Alert explores the track record of transfers of Japanese military equipment in the past 18 months, and how the transfers contribute to Tokyo’s strategic ambition of becoming a fully-fledged security actor in the region, even at the expense of economic benefits.

  • Download document
    03November 2016

    As they enter a period of critical elections, the US and European countries are being confronted by a series of threats from cyberspace. Electronic voting infrastructure and networks of political groups have recorded repeated intrusion, while strategic leaks of compromising documents have sought to influence public opinion.

Pages