2,020 search results for “security” in the Public website
-
Food. Rethinking global security. Earth's Future.
Today, humanity produces sufficient calories, in theory, to feed the 7.7 billion people on the planet: the amount of food produced per person on the planet has gone up more than 40% since the 1960s. Yet, ironically, the prevalence of undernourishment – which had been declining for decades – has started…
-
Sixth edition of the European Cyber Security Perspectives
On 12 March 2019, KPN published the sixth edition of the European Cyber Security Perspectives. Sergei Boeke, researcher at the Institute of Security and Global Affairs, has written an article about Cyber Warfare.
-
Latin America and Caribbean Security and Intelligence Network
The Latin America and Caribbean Security and Intelligence Network (LACSIN) brings together scholars, practitioners, government agencies and the diplomatic community to develop novel and interdisciplinary approaches to addressing key areas of security and intelligence in Latin America and the Caribbe…
-
of a Secret State. The Intelligence & Security Services and their contribution to the National Security State, 1945-1989
Subproject of
-
Why is there no Northeast Asian security architecture?
Why is there no Northeast Asian security architecture? Assessing the strategic impediments to a stable East Asia. In this article, published in 'The Pacific Review', the authors Wang (Peking University) en Stevens (Leiden University) discuss the reasons why.
-
Antonio Missiroli
Faculty Governance and Global Affairs
a.missiroli@fgga.leidenuniv.nl | +31 70 800 9506
-
Cyber Governance and National Security: Intervening in Ungoverned Spaces
The Netherlands Ministry of Defense and Ministry of Security and Justice have requested the Centre for Terrorism and Counterterrorism to complete a research project on cyber governance from a policy perspective. The results of this project will contribute to the deliverables of the fourth International…
-
Unconditionally secure cryptographic protocols from coding-theoretic primitives
This dissertation presents new cryptographic protocols, which can be divided into two families.
-
A History of the National Security State in Turkey
Zeynep Sarlak defended her thesis on 25 August 2020
-
Crisis and Security Management: Governance of Violence (MSc)
Are you thinking about studying Crisis and Security Management: Governance of Violence? Learn more and watch the videos.
-
Crisis and Security Management: Governance of Crisis (MSc)
Are you thinking about studying Crisis and Security Management: Governance of Crisis? Learn more and watch the videos.
-
Crisis and Security Management: War and Peace Studies (MSc)
Are you thinking about studying Crisis and Security Management: War and Peace Studies? Learn more and watch the videos.
-
Online Course Safety & Security Challenges in a Globalized World
Security and safety challenges rank among the most pressing issues of modern times. Challenges such as cyber-crime, terrorism, and environmental disasters impact the lives of millions across the globe. The course will introduce you to this broad theme in an increasingly complex world.
-
Securing the integrity of financial markets in times of crisis
The Hazelhoff Centre for Financial Law research programme for 2020-2023 centres around the integrity of financial markets during times of crisis and possible regulation to secure it.
-
Intstitute of Security and Global Affairs participation at OSCE
On June 9-10 2016 Dr. E. Devroe of the Institute of Security and Global Affairs (ISGA) was invited as a key-note speaker on ‘Intelligence Led policing and community oriented policing’ at the annual meeting of the ‘Organization for Security and Co-operation in Europe’ (OSCE), Transnational Threats Department,…
-
EU Justice Home Affairs Agencies: Securing Good Governance
Dr Madalina Busuioc has completed a study for the European Parliament titled
-
Tim Wuisman
Faculty Governance and Global Affairs
t.wuisman@fgga.leidenuniv.nl | +31 70 800 9506
-
Of ticking bombs: Western security services against political violence and terrorism
How have British, Dutch, and German security services dealt with political violence and terrorism since the late 1960s; to what extent did they consider these new phenomena as a task and how have they developed activities in order to counter these security threats?
-
DiGiuseppe & Kleinberg, ‘Economics, security, and individual-level preferences for trade agreements’
Citizens’s attitudes towards trade are not only about the (perceived) economic effect. Commerce also has a variety of security implications. Employing an original experiment, political scientists Matthew DiGiuseppe (Leiden University) and Katja Kleinberg (Binghamton University) demonstrate that security…
-
Europe as A Global Actor? – The Common Security and Defence Policy in Question
My research project aims to analyze reasons of the European Union’s (EU) inadequacy to develop a strong Common Security and Defense Policy (CSDP) with regard to the role of main EU member states, namely Germany and the United Kingdom (UK) and find the answer of how the EU overcome the CSDP question…
- Self-evaluation MSc Crisis and Security Management
-
Lena Riecke
Faculty Governance and Global Affairs
l.riecke@fgga.leidenuniv.nl | +31 70 800 9506
-
Olga Gadyatskaya
Science
o.gadyatskaya@liacs.leidenuniv.nl | +31 71 527 7033
-
Securing Humanitarian Operations: Preparedness and Response to Cyber Crises in Aid Delivery
How do humanitarian organisations adapt cyber incidents to their specific priorities and needs, and how can they adapt strategies of other organisations?
-
Private active cyber defense and (international) cyber security—pushing the line?
This article on private active cyber defense by Dennis Broeders is part of a special issue of the Journal of Cybersecurity, based on a selection of contributions taken from the 2019 Conference on Cyber Norms organized by The Hague Program for Cyber Norms.
-
Human Security and Conflict in Ukraine: Local Approaches and Transnational Dimensions
The project investigates the implementation of policies and practices related to reconciliation and the strengthening of government capacity in the Odesa and Kharkiv regions of Ukraine.
-
Smart Cities: An Ethnographic Approach to Sensing Infrastructures in Security Practices
Smart digital infrastructures predicated on myriads of sensors distributed in the environment are often rendered as key to contemporary urban security governance to detect risky or suspicious entities before or during a criminal event takes place. At the same time, they often involve surveillance of…
-
Everyday justice and security provision for displaced and residents in Bukavu, DR Congo
How does the presence of internally displaced people impact on the justice and security concerns of longer-term residents in host communities, and to what extent do residents have different concerns than displaced?
-
Crisis and Security Management: Governance of radicalism, extremism and terrorism (MSc)
Are you thinking about studying Crisis and Security Management: Governance of radicalism, extremism and terrorism? Learn more and watch the videos.
-
Too Close for Comfort: Cyber Terrorism and Information Security across National Policies and International Diplomacy
In this article for Studies in Conflict & Terrorism, the authors analyse the evolution and interplay of national policies and international diplomacy on cyber terrorism within and across the UNSC’s permanent five members and the UN process on cyber norms (GGE and OEWG).
-
Small-State Influence in EU Security Governance: Unveiling Latvian Lobbying Against Disinformation
Sophie Vériter explores a small state’s impact on EU security governance, a hard challenge means against big states in this policy area.
-
Jentzsch, Auxiliary Armed Forces and Innovations in Security Governance in Mozambique’s Civil War
Political scientist Corinna Jentzsch (Leiden University) about the organisation of rebel and government auxiliaries in the civil war in Mozambique (1976–1992).
-
Shielding software systems: A comparison of security by design and privacy by design based on a systematic literature review
The authors systematically search and review relevant definitions of Security by Design (SbD) in comparison with Privacy by Design (PbD).
-
The Great War Analogy and the Sino-American Security Dilemma: Foreboding or Fallacious?
Drawing on the analogical lessons of the Great War, this article uses applied history to analyze how the four parallels discerned can help us make sense of contemporary Sino-American rivalry
-
Policing European Metropolises. The politics of security in city-regions
This book focuses on policing in city-regions in Europe bringing together experts from across the continent to develop a sociology of urban policing and a unique methodology for comparing different metropolises in the same country.
-
and technological change: consequences for labour markets and social security.
This research project is funded by a subsidy from Instituut Gak.
-
Digitizing security: How digital risk-profiling is developed in practice
How are digital risk-profiles developed and used in practice?
-
Maaike Smit-Beemsterboer
Faculty Governance and Global Affairs
m.beemsterboer@fgga.leidenuniv.nl | +31 70 800 9143
-
PhD candidate, Secure and sustainable supply of raw materials for strategic value chains. (1.0 fte)
Science, Institute of Environmental Sciences (CML)
-
Frans Osinga
Faculty Governance and Global Affairs
f.p.b.osinga@fgga.leidenuniv.nl | +31 70 800 9506
-
Ahmed Al-Yousefi
Faculty Governance and Global Affairs
a.al-yousefi@fgga.leidenuniv.nl | 070 8009500
-
Adding fuel to the conflict : how gas reserves complicate the Cyprus question
In this research I assess the impact of the recently discovered gas reserves south off Cyprus on the escalation of the Cyprus conflict.
-
immigrants no more? The securitization of immigration in the National Security Strategies of the United States of America
This article studies the securitization of immigration in the United States of America (U.S.), through the analysis of the National Security Strategies (NSS) published between 2002 and 2017, using a two-layered analytical framework that combines securitization theory and agenda setting theory.
-
The giant in the shadow? The Dutch security services in their political, bureaucratic, and societal context between 1912 and 1992
Who tried to influence the mission and position of the Dutch security services between 1912 and 1992, what effect did that have on the form and contents of the security services? How to account for transformations of the security services?
-
Legal Protection of Environmental Refugees. A human rights-based, security and State responsibility approach
On 7 May 2020, Jolanda van der Vliet defended her thesis 'The International Legal Protection of Environmental Refugees. A human rights-based, security and State responsibility approach'. The doctoral research was supervised by Prof. N.J. Schrijver and Prof. J.J.C. Voorhoeve.
-
Security needs cooperation
Interdisciplinary cooperation between public and private actors is of vital importance for facing contemporary security and global affairs challenges. This was the main conclusion of two conferences hosted by the Institute of Security and Global Affairs of Leiden University from 7-10 November 2016.…
-
Alumni Cyber Security Academy in AD "Cyber security is hot, and not only among nerds"
Cyber security is only for socially awkward nerds? Three alumni of the Cyber Security Academy prove the opposite.
-
Rutger Leukfeldt
Faculty Governance and Global Affairs
e.r.leukfeldt@fgga.leidenuniv.nl | +31 70 800 8206
-
Pieter Tops
Faculty Governance and Global Affairs
p.e.w.m.tops@fgga.leidenuniv.nl | +31 71 527 2727
-
Bas Rietjens
Faculty Governance and Global Affairs
s.j.h.rietjens@fgga.leidenuniv.nl | +31 70 800 9506