1,560 search results for “cyber north” in the Public website
-
Why North Korea and Southern Africa are dependent on each other
North Korea may seem like an isolated country but it has strong ties with African regimes. This alliance, which trades in arms despite international sanctions, is increasingly operating out of the liberal world order’s sight, PhD candidate Tycho van der Hoog warns.
-
Between the Wheat & the Waves: a mid-late Anglo-Saxon Settlement in a coastal setting
By comparing the archaeological evidence at Sedgeford and other sites located on both English and Continental coastal zones, what evidence is there for a shared maritime culture between these North Sea communities? Also if evidence is found, can we reveal to some extent a separate coastal identity to…
-
Nada Heddane
Faculteit Rechtsgeleerdheid
n.heddane@law.leidenuniv.nl | +31 71 527 2398
-
Nikki Mulder
Faculteit der Sociale Wetenschappen
n.mulder@fsw.leidenuniv.nl | +31 71 527 3451
-
Marianne Maeckelbergh
Faculteit der Sociale Wetenschappen
m.e.maeckelbergh@fsw.leidenuniv.nl | +31 71 527 2727
-
Nadia Sonneveld
Faculteit Rechtsgeleerdheid
n.sonneveld@law.leidenuniv.nl | +31 71 527 3037
-
Exhibition North Sea Crossings (3/12/21-18/04/22, Oxford)
North Sea Crossings, a new exhibition at the Bodleian Libraries, will trace the long history of Anglo-Dutch relations. Focusing on the period from the Norman Conquest in 1066 to the Glorious Revolution of 1688, items from the Bodleian Libraries’ collections will illustrate the ways in which these exchanges…
-
Habsburg family pulled strings to bring raiders of English North Cape expedition to justice
Richard Chancellor, the English Willem Barentsz, discovered the North Cape during the first English expedition to attempt to find a northeast passage. But the ship, the Edward Bonaventure, was ‘robbed by Flemings on its return in 1554.’ Historian Louis Sicking and legal expert Remco van Rhee found the…
-
Slabbekoorn receives NWA grant to study fish around wind farms in the North Sea
The Dutch Research Council (NWO) awarded behavioural biologist Hans Slabbekoorn (Institute of Biology Leiden) a grant of 750,000 euros to study fish and sounds around wind farms in the North Sea.
-
Rule of law challenges and prospects in Albania and North Macedonia
On 1 October 2019, Dr. Darinka Piqani co-organized and moderated a panel discussion on the theme of “Rule of law challenges and prospects in Albania and North Macedonia”.
-
Dutch involvement in labour exploitation in North Korea, China and Pakistan
Clothes by big Western brands that are on sale in Dutch shops are sometimes made by North Korean workers. The Dutch state is co-financer of a motorway that is being built in Pakistan by exploited workers. These are the conclusions of a report published by the LeidenAsiaCentre on 2 April.
-
Closing the Gap 2023 is just around the corner: three questions about this conference
On 6 and 7 December, the third edition of the Closing the Gap conference will be held in The Hague, hosted by EU Cyber Direct.
-
Who spoke what language in north-western sixth-century China?
Fifteen hundred years ago, the north-west of what we now call China was a jumble of peoples. How did those Indians, Khotanese and Tocharians influence each other and each other's languages? Associate professor Michaël Peyrot has been awarded an ERC grant of almost two million euros to unravel this 'web…
-
Living on the Other Side: A Multidisciplinary Analysis of Migration and Family Law in Morocco
What are the rights of migrants in Morocco and how do this receiving state and migrants deal with them in practice?
-
The writing culture of ancient Dadan; a description and quantitative analysis of linguistics variation
Fokelien Kootstra defended her thesis on 23 April 2019
-
Olga Gadyatskaya
Science
o.gadyatskaya@liacs.leidenuniv.nl | +31 71 527 7033
- Brought under the law of the land
-
Introductie webinar cyber security
Study information
-
Online webinar cyber security
Study information
-
Introductie webinar cyber security
Study information
-
Wars in Ukraine and Gaza could soon affect our approach to the North Pole
The Houthis are attacking ships in the Red Sea. Rerouting via South Africa is expensive, whereas the Arctic route only takes a week. Once a no-go zone, this route might be a more realistic option. Mind the nuclear submarines, though…
-
Farewell Professor Jan van den Berg (ISGA)
A farewell seminar was held on 22 November 2018 in honour of the departure of Prof. dr. Jan van den Berg, Professor in Cyber Security and Scientific Director of the Cyber Security Academy foundation (CSA).
-
Introductie webinar cyber security
Study information
-
From tunnel vision towards an open view. Lessons from the North/South metro line on compensation of damages
An article by Georgina Kuipers has been published this month in Dutch journal Overheid & Aansprakelijkheid (Government and Accountability). It deals with policy introduced in response to damage caused by the construction of the Amsterdam North/South metro line and its aim to rebuild trust. The title…
-
Programme structure
The programme consists of four phases: conceptualisation, specialisation, electives and thesis.
-
Introductie webinar cyber security
Study information, Webinar
-
Introductie webinar cyber security
Study information, Webinar
-
Introductie webinar cyber security
Study information, Webinar
-
Introductie webinar cyber security
Study information, Webinar
-
Introductie webinar cyber security
Study information, Webinar
-
Introductie webinar cyber security
Study information, Webinar
-
Introduction webinar cyber security
Study information, Webinar
-
Introductie webinar cyber security
Study information, Webinar
-
Political elites and regime change in the Middle East and North Africa: accommodation or exclusion?
Political scientist Kevin Köhler (Leiden University) has been awarded a Consolidator Grant by the European Research Council (ERC). This prestigious grant enables him to set up a research group in the coming five years. Köhler and his team will examine how elite conflict affects processes of regime change…
-
Prehistoric hunters from the North Sea used human bones as weapons
Over the years, many spectacular archaeological finds have been washed ashore on the Dutch coast. Among these a large assemblage of barbed points made of bone and antler from the Mesolithic (11,000-8000 BC). The species used by Mesolithic hunter-gatherers to manufacture their barbed points remained…
-
Responsible Behaviour in Cyberspace: Novel Horizons
From 5-7 November 2018, The Hague Program for Cyber Norms held its inaugural conference at Het Spaansche Hof in The Hague, where they were joined by scholars and participants from across the world, for three days filled with four keynotes and 19 presentations during the parallel sessions.
-
Career prospects & Testimonials
The programme is aimed at professionals with a relevant master’s degree from a university (of applied sciences) and several years of professional experience who wish to broaden or deepen their knowledge of cyber security
-
Vulnerabilities and Cyberspace: A New Kind of Crises
In this study, Bibi van den Berg and Sanneke Kuipers from ISGA, explore the ways in which cyber-related incidents may lead to crises
-
Henning Lahmann
Faculteit Rechtsgeleerdheid
h.c.lahmann@law.leidenuniv.nl | +31 71 527 8838
-
Contact
Still have questions about the Cyber Security programme? Please contact us!
-
Staff
The Cyber Security lecturers are scholars and lecturers of Leiden University, Delft University of Technology and The Hague University of Applied Sciences.
-
Daan Weggemans on the impact ICT malfunctions have on hospitals
On Monday 2 September, a computer malfunction severely crippled several hospitals in the Dutch province of Gelderland. Which had a huge impact on patients’ appointments. Daan Weggemans, researcher at the Institute for Security and Global Affairs (ISGA) was interviewed on the issue by Dutch regional…
-
Systems and security
Researchers at LIACS are working to devise the computers of tomorrow that will be the backbone of the Cloud and Edge computing paradigms as well as the Internet of Things. In this respect, we are involved in research and development of high performance computing systems, embedded & real-time computing…
-
Streaming the Sagas: a live role play in the North-European Age of Heroes
Hwæt! You've heard of the adventures of the mighty Beowulf. You've heard of the brave folk standing beside him, and the awe-inspiring foes standing against him. But where their legend still lives, their tale ended long ago... Let us begin a new saga, let us find new heroes, weave a new story - by the…
-
For professionals
The faculty offers several options to deepen and develop your knowledge while being employed. Within the faculty's themes, or in your own working field as a dual PhD candidate, you will be guided to make a next step in your career.
-
Responsible Behaviour in Cyberspace: Global narratives and practice
This edited volume draws from papers presented at the conference Closing the Gap | Responsibility in Cyberspace: Narratives and Practice, organized in June 2022 at the Egmont Palace in Brussels, Belgium, by Leiden University, as part of the EU Cyber Direct project.
-
Offensive Cyber Operations: Understanding Intangible Warfare
Lecture
-
Systems and Security
Researchers at LIACS are working to devise the computers of tomorrow that will be the backbone of the Cloud and Edge computing paradigms as well as the Internet of Things. In this respect, we are involved in research and development of high performance computing systems, embedded & real-time computing…
-
Restraint under conditions of uncertainty: Why the United States tolerates cyberattacks
This new article by Monica Kaminska is part of a special issue for Journal of Cybersecurity, based on a selection of contributions from THe Hague Program for Cyber Norms' 2019 Conference.
- About this minor