Back
About CENS
CENS’ Role in National Security
Our Partners
Distinguished Visitors Programme
Centre Staff
Research Programmes at CENS
Centre Resources
Centre Publications
Centre Staff Publications
CENS Conferences and Workshops
Centre Events
APPSNO
Introduction
Past APPSNO
APPSNO 2019: National Security in the Age of Disruption
APPSNO 2018: Boundaries of National Security
APPSNO 2017: Innovation and National Security
APPSNO 2016: National Security Revisited
APPSNO 2015: Glocalization and National Security
APPSNO 2014: The Challenges of Systemic Resilience for National Security
APPSNO 2013: Narrowing the Theory-Practice Gap
APPSNO 2012: Complexities: Interactions and Inter-dependencies for National Security
APPSNO 2011: Exploring Crisis Resilience
APPSNO 2010: Mainstreaming Counter-Terrorism
APPSNO 2009: Thinking Intelligently About Risk
APPSNO 2008: Resilience Broadly Defined
APPSNO 2007: Developing a Whole-Government Approach to Homeland Security
S. Rajaratnam School of International Studies Think Tank and Graduate School RSIS30th
Nanyang Technological University Nanyang Technological University
  • About CENS
      CENS’ Role in National SecurityOur PartnersDistinguished Visitors Programme
  • Centre Staff
  • Research Programmes at CENS
  • Centre Resources
      Centre PublicationsCentre Staff PublicationsCENS Conferences and Workshops
  • Centre Events
  • APPSNO
      Introduction
      Past APPSNOAPPSNO 2019: National Security in the Age of DisruptionAPPSNO 2018: Boundaries of National SecurityAPPSNO 2017: Innovation and National SecurityAPPSNO 2016: National Security RevisitedAPPSNO 2015: Glocalization and National SecurityAPPSNO 2014: The Challenges of Systemic Resilience for National SecurityAPPSNO 2013: Narrowing the Theory-Practice GapAPPSNO 2012: Complexities: Interactions and Inter-dependencies for National SecurityAPPSNO 2011: Exploring Crisis ResilienceAPPSNO 2010: Mainstreaming Counter-TerrorismAPPSNO 2009: Thinking Intelligently About RiskAPPSNO 2008: Resilience Broadly DefinedAPPSNO 2007: Developing a Whole-Government Approach to Homeland Security
    • Connect with Us

      rsis.ntu
      rsis_ntu
      rsisntu
      rsisvideocast
      school/rsis-ntu
      rsis.sg
      rsissg
      RSIS
      RSS
      Subscribe to RSIS Publications
      Subscribe to RSIS Events

      Getting to RSIS

      Nanyang Technological University
      Block S4, Level B3,
      50 Nanyang Avenue,
      Singapore 639798

      Click here for direction to RSIS
Connect
Search
  • RSIS
  • Research
  • Centre of Excellence for National Security CENS
  • Research Programmes at CENS

Research Programmes at CENS

Research Publications in 2025

  1. Cybersecurity, Cyber Diplomacy and Critical Infrastructure
  2. Disinformation, Foreign Interference, and Hybrid Threats
  3. Social Cohesion and Online Communities
  4. Emerging Technologies and Security

Cybersecurity, Cyber Diplomacy, and Critical Infrastructure

Cyber Diplomacy in Singapore and ASEAN

Jan 2025
Benjamin Ang, Tan E Guang Eugene

“As a small city-state that has always been painfully aware of its diminutive size and corresponding vulnerability, Singapore views diplomacy as an essential part of national strategy.” Read more at Link

Singapore (The Palgrave Handbook on Cyber Diplomacy)

Jan 2025
Tan E Guang Eugene

“This Handbook offers a state-of-the-art overview and comprehensive analysis of the emerging field of cyber diplomacy.” Read more at Link

Securing Singapore’s Undersea Cables

Feb 2025
Asha Hemrajani

“Undersea cables play a crucial role in transcontinental telecommunications. Our dependence on undersea cables is driven by the growth of our collective digital economies and Singapore’s aim to become a regional undersea cable hub.” Read more at Link

Breaking down the OEWG’s legacy: Hits, misses, and unfinished business

Jun 2025
Eugene EG Tan, et al

“The OEWG on cybersecurity (2019–2025) shaped global debates on digital security—but did it deliver? External experts weigh in on its lasting impact, while our team, who tracked the process from day one, dissect the milestones and missed opportunities.” Read more at Link

Strengthening Multilateralism in Cyber Domains

Jul 2025
Tan E Guang Eugene

“Multilateral cooperation in cyber and information domains is needed more than ever, especially at a time when geopolitical conflicts threaten to spiral out of control.” Read more at Link

The Rules of the Road in Cyberspace, 10 Years Later

Aug 2025
Allison Pytlak, Christina Rupp, Eugene EG Tan, Dr Louise Marie Hurel, Talita Dias and Valentin Weber

“For five years, the Open-Ended Working Group (OEWG) on cybersecurity has negotiated key thematic areas which can undermine international stability. Experts following these negotiations weigh in on the progress, sticking points and future of the themes and goals of the OEWG.”

Read more at Link

The CVE Funding Crisis: Implications for Singapore and ASEAN

Sep 2025
Asha Hemrajani, Davis Zheng

“In April 2025, the US-funded MITRE Corporation, which manages a registry (called the Common Vulnerabilities and Exposures (CVE) programme) of cybersecurity vulnerabilities – flaws in computer systems – that can be exploited for malicious purposes, announced that the funding for the CVE programme would cease, sparking alarm across the cybersecurity community.” Read more at Link

Navigating Uncertainty in Cyber Conflict<

Dec 2025
Gil Baram and Herb Lin

“This paper examines false flag operations in cyberspace and their implications for attribution. While these operations are key to understanding cyber conflict, they are mostly understudied outside technical research.” Read more at Link

Cyber Diplomacy through Official Public Attribution

2025
Gil Baram

“International discussions on establishing and implementing norms for behavior in cyberspace have spanned over two decades. However, differences in what constitutes ‘acceptable conduct’ have hindered progress in forming these norms.” Read more at Link

Back to top


Disinformation, Foreign Interference, and Hybrid Threats

Battling Falsehoods on China’s Short Video Platforms

Feb 2025
Zhang Xue

“The rapid rise of short video platforms in China has created a fertile ground for creating and spreading falsehoods. This commentary explores the nature of falsehoods on these platforms, examines existing countermeasures, and discusses the challenges, barriers, and potential solutions.” Read more at Link

The Nexus of Misinformation, Disinformation and Conspiracy Theories with Violent Extremism

Mar 2025
Gulizar Haciyakupoglu and Yasmine Wong

“The authors point to various instances of disinformation in Singapore that were meant to influence perceptions on various issues, organisations and communities. Even where disinformation does not lead to physical violence, it causes trauma and psychological harm.” Read more at Link

Predictors of Misinformation Belief: Survey Evidence

Apr 2025
Gulizar Haciyakupoglu, D.J. Flynn, Nina Wiesehomeier

“We explore the individual-level predictors of misinformation belief through surveys featuring 30 misinformation stories in four countries: Spain, Portugal, the United States, and India. Greater reliance on social media is consistently associated with misinformation belief in all countries.” Read more at Link

Blocked but Not Gone: Inauthentic News Site Alamak.io

Jun 2025
Benjamin Ang, Dymples Leong

“Inauthentic websites may appear harmless but can potentially have malicious intent. Such websites are hard to distinguish from genuine ones and can re-emerge even after being blocked, so discernment and healthy scepticism are essential to mitigate the risks of information manipulation.” Read more at Link

Social Listening Tools in Disinformation Analysis

Aug 2025
Tan E-Reng

“Social listening tools are a vital part of the disinformation and online harms researcher’s toolkit, offering both depth and breadth in the insights they provide. However, there are inherent pitfalls that come with their use.” Read more at Link

Review of Anti-Misinformation/ Disinformation Measures

Dec 2025
Zhang Xue, Dymples Leong, Sean Tan

“As misinformation/disinformation continues to proliferate across online platforms, governments and social media companies have introduced various countermeasures. Despite ongoing efforts, online falsehoods persist. This study investigated the reasons behind this anomaly through a comparative analysis.” Read more at Link

Securing Singapore’s Undersea Cables

Feb 2025
Asha Hemrajani

“Undersea cables play a crucial role in transcontinental telecommunications. Our dependence on undersea cables is driven by the growth of our collective digital economies and Singapore’s aim to become a regional undersea cable hub.” Read more at Link

Europe’s Real Front Line Is Out at Sea

Nov 2025
Sean Tan

“In Europe, debates on security continue to be dominated by questions of rearmament. However, rearmament without maritime infrastructure resilience exposes Europe to Russia’s subtle weapons.” Read more at Link

Response and Resilience: Government Strategies for Securing Subsea Infrastructure in Europe and Asia

Dec 2025
Sean Tan, Benedetta Girardi

“The study compares the threat environments and policy responses of the Netherlands and Singapore—two highly connected economies whose prosperity depends on secure and resilient critical undersea infrastructure (CUI), including internet cables, energy pipelines, and power interconnectors.” Read more at Link

Back to top


Social Cohesion & Online Communities

Scam Centre-Related Human Trafficking in ASEAN Countries

Mar 2025
Asha Hemrajani

“Young people are being trafficked to work in cyber scam centres in ASEAN countries such as Myanmar, Laos, the Philippines, and Cambodia. These centres bring significant revenues to operators but harm ASEAN’s reputation and risk the growth of ASEAN economies.” Read more at Link

The Power of Memes in India-Pakistan Conflict

May 2025
Antara Chakraborthy, Yasmine Wong

“In an era where wars are fought as much with symbols as with bullets, memes have become tools of influence, contestation, and digital diplomacy. What could once be dismissed as trivial internet banter, slowly transformed into soft power in motion.” Read more at Link

Gender and the 2025 Singapore Elections

Jun 2025
Yasmine Wong

“Misogynistic attacks against women in politics remain all too common, but public awareness of the issue is growing.”

Read more at Link

Strategic Currents: “Triggered” and “Mobilised” – Evolving Identities and Implications for National Cohesion and Security

Jun 2025
Bernard F W Loo and Damien D Cheong (editors)

The book examines how Singapore’s youth face global influences leading to self-radicalisation and extremism, offering strategies to counter these risks and strengthen national resilience and social cohesion. Read more at Link

Can Malaysia nudge ASEAN beyond non-interference to tackle the scam crisis in Myanmar?

Jul 2025
Asha Hemrajani and Liu WeiYi

“ASEAN’s traditional non-interference doctrine has posed an acute challenge for the regional body in responding to the 2021 coup in Myanmar.” Read more at Link

From Banal to Extreme: Breeding Grounds for Far-Right

Sep 2025
Yasmine Wong, Antara Chakraborthy

“The recent case of a 14-year-old male Singaporean radicalised through extremist content illustrates the dangers of how seemingly benign communities and platform algorithms are pipelines for radicalisation.” Read more at Link

The Interplay of Hindu Nationalism, Diaspora Politics, and Regional Security

Nov 2025
Antara Chakraborthy

“The rise and normalisation of Hindu nationalism in India’s political landscape has far-reaching implications, as its domestic politics and diaspora become more interconnected.”

Read more at Link

Back to top


Emerging Technologies and Security

Will AI Enhance Decision-Making in Nuclear Weapons?

Apr 2025
Alvin Chew, Asha Hemrajani

“AI has been integrated into nuclear weapon doctrines to facilitate efficient autonomous decision-making. While speed is often crucial in military operations, decisions to launch weapons of mass destruction, such as nuclear weapons, require deliberate human intuition and intervention that surpasses calculated assessments generated by AI.” Read more at Link

How AI Could Boost Information Operations and Aid Terrorist Financing

June 2025
Asha Hemrajani

“Artificial Intelligence (AI) is changing the way intelligence is gathered and used, affecting geopolitical tensions and terrorism. It has been reported that terrorist and violent extremist actors are leveraging AI to enhance their operations in three ways: boosting information operations, recruitment and financing.” Read more at Link

The Role of AI in Modern Diplomacy

Sep 2025
Asha Hemrajani, Rick Tan

“Artificial Intelligence (AI) is set to become a game-changer in the field of diplomacy. From crisis response to conflict prevention and resolution, AI holds significant potential to enhance core diplomatic functions. However, its limitations necessitate a cautious, human-centred approach.” Read more at Link

Who’s Accountable When AI Agents Go Rogue?

Oct 2025
Asha Hemrajani

“The rise of autonomous AI systems has revealed a new frontier in cybersecurity risk, expanding attack surfaces and blurring accountability. Safe and responsible deployment has hence become a defining cybersecurity challenge. Governance of non-human identities and adaptive, policy-driven controls to detect and contain attacks on AI models, apps, and workflows will be needed to establish trusted autonomy.” Read more at Link


Popular Links

About RSISResearch ProgrammesGraduate EducationPublicationsEventsAdmissionsCareersRSIS Intranet

Connect with Us

rsis.ntu
rsis_ntu
rsisntu
rsisvideocast
school/rsis-ntu
rsis.sg
rsissg
RSIS
RSS
Subscribe to RSIS Publications
Subscribe to RSIS Events

Getting to RSIS

Nanyang Technological University
Block S4, Level B3,
50 Nanyang Avenue,
Singapore 639798

Click here for direction to RSIS

Get in Touch

    Copyright © S. Rajaratnam School of International Studies. All rights reserved.
    Last updated on
    Privacy Statement / Terms of Use
    Help us improve

      Rate your experience with this website
      123456
      Not satisfiedVery satisfied
      What did you like?
      0/255 characters
      What can be improved?
      0/255 characters
      Your email
      Please enter a valid email.
      Thank you for your feedback.
      This site uses cookies to offer you a better browsing experience. By continuing, you are agreeing to the use of cookies on your device as described in our privacy policy. Learn more
      OK
      Latest Book
      more info