1,089 search results for “cyber norms” in the Public website
-
The Hague Program for Cyber Norms
A research program that focuses on the development and implementation of cyber norms.
-
Let Them Roar: Small States as Cyber Norm Entrepreneurs
A discourse on international cyber norms has emerged ever since the United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security (UN GGE) recommended eleven norms on responsible state behaviour in cyberspace.
-
Revisiting past cyber operations in light of new cyber norms and interpretations of international law: inching towards lines in the sand?
This article traces the evolution of interpretations of international law and international cyber norms on responsible state behaviour in cyberspace by reassessing five major – and allegedly state-led – cyber operations: Stuxnet 2010; Belgacom 2013-2014, the Ukrainian power grid 2015, the US presidential…
-
Voluntary, Non-Binding Norms for Responsible State Behaviour in the Use of Information and Communications Technology: A Commentary
The United Nations Office for Disarmament Affairs (UNODA) has published the 2017 issue in their Civil Society and Disarmament series, titled Voluntary, Non-Binding Norms for Responsible State Behaviour in the Use of Information and Communications Technology: A Commentary. The series aims to provide…
-
What are cyber norms?
Interview with prof.dr. Dennis Broeders in magazine De Veiligheidsdiplomaat (The Security Diplomat)
-
The unexpected norm-setters: Intelligence agencies in cyberspace
Ilina Georgieva published an article in the journal Contemporary Security Policy on the norm-setting role of intelligence agencies.
-
Shades of grey: cyber intelligence and (inter)national security
This paper examines cyber intelligence in the context of national and international security.
-
The Demilitarisation of Cyber Conflict
The debate about state behaviour in cyberspace may be set in the wrong legal key.
-
Tatiana Tropina
Faculty Governance and Global Affairs
t.tropina@fgga.leidenuniv.nl | +31 70 800 9500
-
EU Cyber Diplomacy Initiative (EU Cyber Direct)
EU Cyber Direct – EU Cyber Diplomacy Initiative supports the European Union’s cyber diplomacy and international digital engagements in order to strengthen rules-based order in cyberspace and build cyber resilient societies. To that aim, we conduct research, support capacity building in partner countries,…
-
Cyber Security Governance
The research group Cyber Security Governance will provide cutting-edge academic research in the domain of cyber, where modern technology interacts with traditional concepts such as governance, sovereignty, law-enforcement, international relations and conflict.
-
The Hague Program for Cyber Norms successfully concludes their UN GGE norms commentary project
The Leiden University’s Program for Cyber Norms, a research platform to investigate the development and implementation of law and policy applicable to uses of ICTs, in cooperation with the think-tank ICT4Peace conducted a global open consultation on how to implement the UN Group of Governmental Experts’…
-
Private active cyber defense and (international) cyber security—pushing the line?
This article on private active cyber defense by Dennis Broeders is part of a special issue of the Journal of Cybersecurity, based on a selection of contributions taken from the 2019 Conference on Cyber Norms organized by The Hague Program for Cyber Norms.
-
The Hague Program on International Cyber Security
Taking the changing landscape of international cyber security and cyber conflict as a point of departure, The Hague Program on International Cyber Security focuses on the various modes of governance that states and other actors can bring into play to deal with and shape the strategic changes and challenges…
-
Foreign intelligence in the digital age. Navigating a state of 'unpeace'.
The Hague Program for Cyber Norms, a research program at the Institute of Security and Global Affairs, published its first policy brief, in which Dennis Broeders, Sergei Boeke and Ilina Georgieva explore the role of intelligence agencies in cyberspace and the (im)possibilities of oversight and regulation…
-
Too Close for Comfort: Cyber Terrorism and Information Security across National Policies and International Diplomacy
In this article for Studies in Conflict & Terrorism, the authors analyse the evolution and interplay of national policies and international diplomacy on cyber terrorism within and across the UNSC’s permanent five members and the UN process on cyber norms (GGE and OEWG).
-
Countering cyber terrorism in a time of 'war on words': Kryptonite for the protection of digital rights?
This collection includes six short policy-focused contributions exploring how legislation and policy on counter cyber terrorism unfold at the national level in the United States, the United Kingdom, China, Russia, France, and at the regional level of the European Union.
-
Sixth edition of the European Cyber Security Perspectives
On 12 March 2019, KPN published the sixth edition of the European Cyber Security Perspectives. Sergei Boeke, researcher at the Institute of Security and Global Affairs, has written an article about Cyber Warfare.
-
Cyber Security by Integrated Design (C-SIDe)
C-SIDe project involves a broad selection of associates in solving cybersecurity problems. Security of software systems has emerged as a critical need in our interconnected society. Companies developing software products look for Security-by-Design approaches accommodating security into their software…
-
Open Consultation on UN GGE 2015 Norm Proposals
The Leiden University’s Program for Cyber Norms, a research platform to investigate the development and implementation of law and policy applicable to uses of ICTs, in cooperation with the think-tank ICT4Peace conducted a global open consultation on how to implement the UN Group of Governmental Experts’…
-
Cyber security
To make digital communication more secure, we need to tighten up the legal frameworks and identify the biggest cyber threats.
-
Cyber Security
Cyber security is one of the critical challenges in our inter-connected world. Organizations are being constantly targeted by adversaries. Various critical systems become exposed on the Internet. Users can find that their data has been stolen from a company that they were not even aware of.
-
Cyber Security
The Leiden Institute of Advance Computer Science (LIACS) in collaboration with the Institute of Security and Global Affairs (ISGA) have developed the minor Cyber Security to provide students with a mixture of technical and governance knowledge to set them on a path towards understanding cyberspace and…
-
Cyber Security (MSc)
The executive master’s programme in Cyber Security of Leiden University takes a multidisciplinary approach that helps you develop effective and sustainable solutions for cyber risks and threats.
-
Executive Master Cyber Security
The executive Master’s Programme Cyber Security takes a multidisciplinary approach that helps you develop effective and sustainable solutions for cyber risks and threats.
-
Research group Cyber Security Governance
The research group Cyber Security Governance will provide cutting-edge academic research in the domain of cyber, where modern technology interacts with traditional concepts such as governance, sovereignty, law-enforcement, international relations and conflict.
-
Cyber Operations and International Law
This book offers a comprehensive analysis of the international law applicable to cyber operations, including a systematic examination of attribution, lawfulness and remedies. It demonstrates the importance of countermeasures as a form of remedies and also shows the limits of international law, highlighting…
-
Limiting Viral Spread: Automated Cyber Operations and the Principles of Distinction and Discrimination in the Grey Zone
Monica Kaminska, Dennis Broeders and Fabio Cristiano have contributed a chapter to the proceedings of the 13th International Conference on Cyber Conflict (CyCon 2021), which gathers 20 articles from the law, technology and strategy domains.
-
Israel: cyber securitization as national trademark & Palestinian territory occupied: cybersecurity at reduced sovereignty
Fabio Cristiano contributed two chapters to the Routledge Companion to Global Cyber-Security Strategy, edited by Scott N. Romaniuk and Mary Manjikian.
-
Cyber agent technology and intelligence agencies
Cyber agent technology and intelligence agencies is a project that is commissioned by Tracks Inspector, a Dutch company that develops innovative software.
-
Cyber-noir: Cybersecurity and popular culture
New article on popular culture influences on cybersecurity experts, available Open Access at Contemporary Security Policy, part of a special issue edited by dr. Myriam Dunn Cavelty.
-
Alumni Cyber Security Academy in AD "Cyber security is hot, and not only among nerds"
Cyber security is only for socially awkward nerds? Three alumni of the Cyber Security Academy prove the opposite.
-
Toward an Aesthetics by Algorithms—Palestinian Cyber and Digital Spaces at the Threshold of (In)visibility
Chapter by Fabio Cristiano and Emilio Distretti for the volume The Aesthetics and Politics of the Online Self, edited by Donatella Della Ratta, Geert Lovink, Teresa Numerico, and Peter Sarram for Palgrave Macmillan.
-
Cyber Governance and National Security: Intervening in Ungoverned Spaces
The Netherlands Ministry of Defense and Ministry of Security and Justice have requested the Centre for Terrorism and Counterterrorism to complete a research project on cyber governance from a policy perspective. The results of this project will contribute to the deliverables of the fourth International…
-
On the computation of norm residue symbols
An algorithm is discussed to compute the exponential representation of principal units in a finite extension field F of the p-adic rationals.
-
Is the Gulf Cooperation Council (GCC) Cyber Resilient?
James Shires, Assistant Professor at the Institute of Security and Global Affairs at Leiden University, co-authored this report on the GCC's cyber resilience with Joyce Hakmeh, Senior Research Fellow of Chatham House's International Security Programme.
-
Freedom AND Security - Conference Report Published by Europol
On 22 November 2018, Els De Busser spoke at a panel during the conference
-
Normativity and its sources: Agency, interaction and conflict in a globalizing world
Are there general principles or values that should govern our actions as moral agents and/or as political subjects?
-
Bakker, ‘Do liberal norms matter?’, Acta Politica 2016
An experimental comparison of the impact of liberal norms on a population residing and socialised within a democracy (the Netherlands) with a population in an autocracy (China) and their respective supports for war with another state shows that the level of liberal norms in the democratic experimental…
-
Instrumental and normative pathways to compliance
On 31 March 2022, Bo Terpstra defended the thesis 'Instrumental and normative pathways to compliance'. The doctoral research was supervised by Prof. K.P. Goudswaard.
-
Governing Cyberspace: Behavior, Power and Diplomacy
Governing Cyberspace: Behavior, Power and Diplomacy is based on a selection of papers presented during The Hague Program for Cyber Norms' inaugural conference Novel Horizons: Responsible Behaviour in Cyberspace from 5-7 November 2018 in The Hague. The volume is edited by Dennis Broeders and Bibi van…
-
Responsible Behaviour in Cyberspace: Global narratives and practice
This edited volume draws from papers presented at the conference Closing the Gap | Responsibility in Cyberspace: Narratives and Practice, organized in June 2022 at the Egmont Palace in Brussels, Belgium, by Leiden University, as part of the EU Cyber Direct project.
-
Language Use, Usage Guides and Linguistic Norms
Language Use, Usage Guides and Linguistic Norms will be of interest to scholars of language use in both the past and the present, as well as to anyone interested in the interplay between actual language use and prescriptive attitudes towards language.
-
Peace Mediators as Norm Entrepreneurs: The EU's Norm Diffusion Strategy in Montenegro's Referendum on Independence
On a referendum held on May 21, 2006, 55.5% of voters in Montenegro voted in favor of their country’s independence. While in numerical terms the outcome shows overwhelming support for independent Montenegro, from a normative standpoint it was a narrow win. The normative framework that regulated rules…
-
Three tales of attribution in cyberspace. Criminal law, international law and policy debates
In this policy brief, Dennis Broeders, Els De Busser and Patryk Pawlak discuss attribution of in cyberspace from three different perspectives: criminal law, international law and policy. Published together with EU Cyber Direct.
-
Daniel Thomas, 'Beyond Identity: Membership Norms and Regional Organisation', European Journal of International Relations
Article by Leiden University political scientist Daniel Thomas about shifting norms for membership in international organisations.
-
Securing Humanitarian Operations: Preparedness and Response to Cyber Crises in Aid Delivery
How do humanitarian organisations adapt cyber incidents to their specific priorities and needs, and how can they adapt strategies of other organisations?
-
A coalition of the unwilling? Chinese and Russian perspectives on cyberspace
The Hague Program for Cyber Norms, a research program at the Institute of Security and Global Affairs, published its second policy brief, in which Dennis Broeders, Liisi Adamson and Rogier Creemers explore aspects of the relationship between China and Russia in cyberspace.
-
On the Term 'Environmental Refugee': Normative Assumptions and Empirical Realities
The authors compare assumptions about normative utility of the term 'environmental refugee' with empirical evidence compared to 'environmental migrant'.
-
Restraint under conditions of uncertainty: Why the United States tolerates cyberattacks
This new article by Monica Kaminska is part of a special issue for Journal of Cybersecurity, based on a selection of contributions from THe Hague Program for Cyber Norms' 2019 Conference.