1,044 search results for “cyber north” in the Public website
-
The Hague Program for Cyber Norms
A research program that focuses on the development and implementation of cyber norms.
-
EU Cyber Diplomacy Initiative (EU Cyber Direct)
EU Cyber Direct – EU Cyber Diplomacy Initiative supports the European Union’s cyber diplomacy and international digital engagements in order to strengthen rules-based order in cyberspace and build cyber resilient societies. To that aim, we conduct research, support capacity building in partner countries,…
-
Let Them Roar: Small States as Cyber Norm Entrepreneurs
A discourse on international cyber norms has emerged ever since the United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security (UN GGE) recommended eleven norms on responsible state behaviour in cyberspace.
-
The Demilitarisation of Cyber Conflict
The debate about state behaviour in cyberspace may be set in the wrong legal key.
-
Sixth edition of the European Cyber Security Perspectives
On 12 March 2019, KPN published the sixth edition of the European Cyber Security Perspectives. Sergei Boeke, researcher at the Institute of Security and Global Affairs, has written an article about Cyber Warfare.
-
Cyber security
To make digital communication more secure, we need to tighten up the legal frameworks and identify the biggest cyber threats.
-
Cyber Security
Cyber security is one of the critical challenges in our inter-connected world. Organizations are being constantly targeted by adversaries. Various critical systems become exposed on the Internet. Users can find that their data has been stolen from a company that they were not even aware of.
-
Cyber Security by Integrated Design (C-SIDe)
C-SIDe project involves a broad selection of associates in solving cybersecurity problems. Security of software systems has emerged as a critical need in our interconnected society. Companies developing software products look for Security-by-Design approaches accommodating security into their software…
-
Cyber Security Governance
The research group Cyber Security Governance will provide cutting-edge academic research in the domain of cyber, where modern technology interacts with traditional concepts such as governance, sovereignty, law-enforcement, international relations and conflict.
-
Cyber Security (MSc)
The executive master’s programme in Cyber Security of Leiden University takes a multidisciplinary approach that helps you develop effective and sustainable solutions for cyber risks and threats.
-
Executive Master Cyber Security
The executive Master’s Programme Cyber Security takes a multidisciplinary approach that helps you develop effective and sustainable solutions for cyber risks and threats.
-
Cyber Security Governance Essentials
The Leiden Institute of Advance Computer Science (LIACS) in collaboration with the Institute of Security and Global Affairs (ISGA) have developed the minor Cyber Security Governance Essentials to provide students with a mixture of technical and governance knowledge to set them on a path towards understanding…
-
Cyber Operations and International Law
This book offers a comprehensive analysis of the international law applicable to cyber operations, including a systematic examination of attribution, lawfulness and remedies. It demonstrates the importance of countermeasures as a form of remedies and also shows the limits of international law, highlighting…
-
Shades of grey: cyber intelligence and (inter)national security
This paper examines cyber intelligence in the context of national and international security.
-
Private active cyber defense and (international) cyber security—pushing the line?
This article on private active cyber defense by Dennis Broeders is part of a special issue of the Journal of Cybersecurity, based on a selection of contributions taken from the 2019 Conference on Cyber Norms organized by The Hague Program for Cyber Norms.
-
Revisiting past cyber operations in light of new cyber norms and interpretations of international law: inching towards lines in the sand?
This article traces the evolution of interpretations of international law and international cyber norms on responsible state behaviour in cyberspace by reassessing five major – and allegedly state-led – cyber operations: Stuxnet 2010; Belgacom 2013-2014, the Ukrainian power grid 2015, the US presidential…
-
The Hague Program on International Cyber Security
Taking the changing landscape of international cyber security and cyber conflict as a point of departure, The Hague Program on International Cyber Security focuses on the various modes of governance that states and other actors can bring into play to deal with and shape the strategic changes and challenges…
-
Cyber agent technology and intelligence agencies
Cyber agent technology and intelligence agencies is a project that is commissioned by Tracks Inspector, a Dutch company that develops innovative software.
-
Cyber-noir: Cybersecurity and popular culture
New article on popular culture influences on cybersecurity experts, available Open Access at Contemporary Security Policy, part of a special issue edited by dr. Myriam Dunn Cavelty.
-
Israel: cyber securitization as national trademark & Palestinian territory occupied: cybersecurity at reduced sovereignty
Fabio Cristiano contributed two chapters to the Routledge Companion to Global Cyber-Security Strategy, edited by Scott N. Romaniuk and Mary Manjikian.
-
Aestheticized politics : the workings of North Korean art
This dissertation is a study of North Korean art as a site where politics, history, and culture meet.
-
Islam in North Africa
As Lila Abu Lughod pointed out in 1989, North Africa has been one of the geographical ‘zones of prestige’ for the development of canonical approaches and crucial theoretical debates regarding the comparative study of Islam.
-
Cyber Governance and National Security: Intervening in Ungoverned Spaces
The Netherlands Ministry of Defense and Ministry of Security and Justice have requested the Centre for Terrorism and Counterterrorism to complete a research project on cyber governance from a policy perspective. The results of this project will contribute to the deliverables of the fourth International…
-
North American Studies (MA)
The master’s programme in North American Studies at Leiden University takes a multidisciplinary approach to the study of the United States, with a particular emphasis on examining key aspects of American history, culture, and literature.
-
North American Studies
Are you thinking about studying North American Studies? Learn more and watch the introduction video.
-
Is the Gulf Cooperation Council (GCC) Cyber Resilient?
James Shires, Assistant Professor at the Institute of Security and Global Affairs at Leiden University, co-authored this report on the GCC's cyber resilience with Joyce Hakmeh, Senior Research Fellow of Chatham House's International Security Programme.
-
Introductie webinar cyber security
Study information
-
Parking lot Maliebaan North
, Maliebaan 30, 2311 CC, Leiden
- Middle East & North Africa
-
Securing Humanitarian Operations: Preparedness and Response to Cyber Crises in Aid Delivery
How do humanitarian organisations adapt cyber incidents to their specific priorities and needs, and how can they adapt strategies of other organisations?
-
Too Close for Comfort: Cyber Terrorism and Information Security across National Policies and International Diplomacy
In this article for Studies in Conflict & Terrorism, the authors analyse the evolution and interplay of national policies and international diplomacy on cyber terrorism within and across the UNSC’s permanent five members and the UN process on cyber norms (GGE and OEWG).
-
Pride, Prejudice and Manchurian Heritage: North Korean Migrants and Memories of a Land Left Behind
Christopher Green defended his thesis on 26 February 2020
-
Aria of the Dutch North Sea
Promotores: C. J. ten Cate; M. A. Ainslie. Co-promotor: W. Slabbekoorn
-
Slaves To The System: Researching North Korean Forced Labor in the EU
SLAVES TO THE SYSTEM: Locating Responsibility for Forced Expatriate Labour Practices by the Democratic People’s Republic of Korea (DPRK)
-
Beacons of Freedom: Slave Refugees in North America, 1800-1860
This project applies a social-historical approach to examine and contrast various groups of African-American slave refugees who sought freedom within North America between 1800 and 1860. It innovatively distinguishes between different “spaces of freedom” for runaway slaves, namely sites of formal, semi-formal,…
-
Toward an Aesthetics by Algorithms—Palestinian Cyber and Digital Spaces at the Threshold of (In)visibility
Chapter by Fabio Cristiano and Emilio Distretti for the volume The Aesthetics and Politics of the Online Self, edited by Donatella Della Ratta, Geert Lovink, Teresa Numerico, and Peter Sarram for Palgrave Macmillan.
-
Urbanism and municipal administration in Roman North Africa
This project uses archaeological, literary and epigraphic evidence to investigate urban development in Roman-period North Africa, compiling this in a GIS-linked database in order to analyse the development of urban settlement spatially over time.
-
Islam in North Africa: A Critical Return to Youth
In recent years, and especially since the ‘Arab Spring’ of 2011, a growing body of research, media reporting, and scholarly literature has focused on the role of ‘Arab youth’ as the drivers of social and political movements across the Middle East and North Africa.
-
Alumni Cyber Security Academy in AD "Cyber security is hot, and not only among nerds"
Cyber security is only for socially awkward nerds? Three alumni of the Cyber Security Academy prove the opposite.
-
Unlock the cyber crisis: Developing the prototype of an escape room-style cooperative game for cybersecurity education
The project aims to develop an escape room-style game to teach students cyber crisis management and prepare them for real-world cybersecurity challenges
-
Countering cyber terrorism in a time of 'war on words': Kryptonite for the protection of digital rights?
This collection includes six short policy-focused contributions exploring how legislation and policy on counter cyber terrorism unfold at the national level in the United States, the United Kingdom, China, Russia, France, and at the regional level of the European Union.
-
Limiting Viral Spread: Automated Cyber Operations and the Principles of Distinction and Discrimination in the Grey Zone
Monica Kaminska, Dennis Broeders and Fabio Cristiano have contributed a chapter to the proceedings of the 13th International Conference on Cyber Conflict (CyCon 2021), which gathers 20 articles from the law, technology and strategy domains.
-
How can we increase the financial sector’s resilience to cyber attacks? Get inside the mind of a hacker!
The financial sector is an appealing target for hackers. For that reason, lawmakers and regulators are going to great lengths to make the sector more resilient to cyber attacks. One recent measure was the introduction of the Digital Operational Resilience Act (DORA). This new EU regulation is extremely…
-
Prehistoric settlement patterns around the southern North Sea
Papers presented at a colloquium, held in honour of Professor Dr. P.J.R. Modderman, Leiden, 3-7 May 1982.
-
Rutger Leukfeldt
Faculty Governance and Global Affairs
e.r.leukfeldt@fgga.leidenuniv.nl | +31 70 800 8206
-
Parto Mirzaei
Faculty Governance and Global Affairs
p.mirzaei@fgga.leidenuniv.nl | +31 70 800 9506
-
The urban system in the North Western provinces
The first objective is to create a catalogue raisonée, i.e. a structured database that will store the main attributes of each town in a standardized format database, which will be freely accessible when completed; the second objective is to exploit theories and methods that can help us to understand…
-
Unequal Land Relations in North East India: Custom, Gender and the Market
Presenting case studies by both senior and emerging scholars, it makes mandatory reading for anyone interested in the challenges of governance, citizenship and development faced by the people of India’s North East.
-
Identification-imitation-amplification: understanding divisive influence campaigns through cyberspace
Jelena Vićić and Richard Harknett offer an analytical construct to better understand the mechanism by which cyber-enabled influence operations work
-
Writing under Wartime Conditions: North and South Korean Writers during the Korean War (1950-1953)
Writing under Wartime Conditions is a study into North and South Korean literature written during the Korean War.