1,913 search results for “cyber north” in the Public website
- 
                            
    The Hague Program for Cyber Norms
    
    
A research program that focuses on the development and implementation of cyber norms.
 - 
                            
    Let Them Roar: Small States as Cyber Norm Entrepreneurs
    
    
A discourse on international cyber norms has emerged ever since the United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security (UN GGE) recommended eleven norms on responsible state behaviour in cyberspace.
 - 
                            
    EU Cyber Diplomacy Initiative (EU Cyber Direct)
    
    
EU Cyber Direct – EU Cyber Diplomacy Initiative supports the European Union’s cyber diplomacy and international digital engagements in order to strengthen rules-based order in cyberspace and build cyber resilient societies. To that aim, we conduct research, support capacity building in partner countries,…
 - 
                            
    Sixth edition of the European Cyber Security Perspectives
    
    
On 12 March 2019, KPN published the sixth edition of the European Cyber Security Perspectives. Sergei Boeke, researcher at the Institute of Security and Global Affairs, has written an article about Cyber Warfare.
 - 
                            
    The Demilitarisation of Cyber Conflict
    
    
The debate about state behaviour in cyberspace may be set in the wrong legal key.
 - 
                            
    Cyber security
    
    
To make digital communication more secure, we need to tighten up the legal frameworks and identify the biggest cyber threats.
 - 
                            
    Cyber Security
    
    
Cyber security is one of the critical challenges in our inter-connected world. Organizations are being constantly targeted by adversaries. Various critical systems become exposed on the Internet. Users can find that their data has been stolen from a company that they were not even aware of.
 - 
                            
    Cyber Security
    
    
The Leiden Institute of Advance Computer Science (LIACS) in collaboration with the Institute of Security and Global Affairs (ISGA) have developed the minor Cyber Security to provide students with a mixture of technical and governance knowledge to set them on a path towards understanding cyberspace and…
 - 
                            
    Research project Cyber Security by Integrated Design (C-SIDe)
    
    
C-SIDe project involves a broad selection of associates in solving cybersecurity problems. Security of software systems has emerged as a critical need in our interconnected society. Companies developing software products look for Security-by-Design approaches accommodating security into their software…
 - 
                            
    Cyber Security (MSc)
    
    
The executive master’s programme in Cyber Security of Leiden University takes a multidisciplinary approach that helps you develop effective and sustainable solutions for cyber risks and threats.
 - 
                            
    Shades of grey: cyber intelligence and (inter)national security
    
    
This paper examines cyber intelligence in the context of national and international security.
 - 
                            
    Research group Cyber Security Governance
    
    
The research group Cyber Security Governance will provide cutting-edge academic research in the domain of cyber, where modern technology interacts with traditional concepts such as governance, sovereignty, law-enforcement, international relations and conflict.
 - 
                            
    Cyber Operations and International Law
    
    
This book offers a comprehensive analysis of the international law applicable to cyber operations, including a systematic examination of attribution, lawfulness and remedies. It demonstrates the importance of countermeasures as a form of remedies and also shows the limits of international law, highlighting…
 - 
                            
    Revisiting past cyber operations in light of new cyber norms and interpretations of international law: inching towards lines in the sand?
    
    
This article traces the evolution of interpretations of international law and international cyber norms on responsible state behaviour in cyberspace by reassessing five major – and allegedly state-led – cyber operations: Stuxnet 2010; Belgacom 2013-2014, the Ukrainian power grid 2015, the US presidential…
 - 
                            
    Private active cyber defense and (international) cyber security—pushing the line?
    
    
This article on private active cyber defense by Dennis Broeders is part of a special issue of the Journal of Cybersecurity, based on a selection of contributions taken from the 2019 Conference on Cyber Norms organized by The Hague Program for Cyber Norms.
 - 
                            
    The Hague Program on International Cyber Security
    
    
Taking the changing landscape of international cyber security and cyber conflict as a point of departure, The Hague Program on International Cyber Security focuses on the various modes of governance that states and other actors can bring into play to deal with and shape the strategic changes and challenges…
 - 
                            
    Cyber-noir: Cybersecurity and popular culture
    
    
New article on popular culture influences on cybersecurity experts, available Open Access at Contemporary Security Policy, part of a special issue edited by dr. Myriam Dunn Cavelty.
 - 
                            
    Cyber agent technology and intelligence agencies
    
    
Cyber agent technology and intelligence agencies is a project that is commissioned by Tracks Inspector, a Dutch company that develops innovative software.
 - 
                            
    Israel: cyber securitization as national trademark & Palestinian territory occupied: cybersecurity at reduced sovereignty
    
    
Fabio Cristiano contributed two chapters to the Routledge Companion to Global Cyber-Security Strategy, edited by Scott N. Romaniuk and Mary Manjikian.
 - 
                            
    Aestheticized politics : the workings of North Korean art
    
    
This dissertation is a study of North Korean art as a site where politics, history, and culture meet.
 - 
                            
    Islam in North Africa
    
    
As Lila Abu Lughod pointed out in 1989, North Africa has been one of the geographical ‘zones of prestige’ for the development of canonical approaches and crucial theoretical debates regarding the comparative study of Islam.
 - 
                            
    North American Studies (MA)
    
    
The master’s programme in North American Studies at Leiden University takes a multidisciplinary approach to the study of the United States, with a particular emphasis on examining key aspects of American history, culture, and literature.
 - 
                            
    North American Studies
    
    
Are you thinking about studying North American Studies? Learn more and watch the introduction video.
 - 
                            
    Cyber Governance and National Security: Intervening in Ungoverned Spaces
    
    
The Netherlands Ministry of Defense and Ministry of Security and Justice have requested the Centre for Terrorism and Counterterrorism to complete a research project on cyber governance from a policy perspective. The results of this project will contribute to the deliverables of the fourth International…
 - 
                            
    Is the Gulf Cooperation Council (GCC) Cyber Resilient?
    
    
James Shires, Assistant Professor at the Institute of Security and Global Affairs at Leiden University, co-authored this report on the GCC's cyber resilience with Joyce Hakmeh, Senior Research Fellow of Chatham House's International Security Programme.
 - 
                            
    North East Asia
    
    
Leiden University has a long tradition of Asian language education. Chinese, Japanese and Korean partners are essential in providing a practical side of learning education.
 - 
                            
    Parking garage Maliebaan North
    
    
, Maliebaan 30, 2311 CC, Leiden
 - 
                            
    Pride, Prejudice and Manchurian Heritage: North Korean Migrants and Memories of a Land Left Behind
    
    
Christopher Green defended his thesis on 26 February 2020
 - Middle East & North Africa
 - 
                            
    ISGA gains major European cyber project: EU Cyber Direct
        
    
Dennis Broeders, professor of global security and technology at ISGA (Institute of Security and Global Affairs), together with two partners, has been granted a major European project: EU Cyber Direct. Together with EU ISS and Carnegie Europe, ISGA forms a new consortium for 3 years with a total budget…
 - 
                            
    Slaves To The System: Researching North Korean Forced Labor in the EU
    
    
SLAVES TO THE SYSTEM: Locating Responsibility for Forced Expatriate Labour Practices by the Democratic People’s Republic of Korea (DPRK)
 - 
                            
    Beacons of Freedom: Slave Refugees in North America, 1800-1860
    
    
This project applies a social-historical approach to examine and contrast various groups of African-American slave refugees who sought freedom within North America between 1800 and 1860. It innovatively distinguishes between different “spaces of freedom” for runaway slaves, namely sites of formal, semi-formal,…
 - 
                            
    Too Close for Comfort: Cyber Terrorism and Information Security across National Policies and International Diplomacy
    
    
In this article for Studies in Conflict & Terrorism, the authors analyse the evolution and interplay of national policies and international diplomacy on cyber terrorism within and across the UNSC’s permanent five members and the UN process on cyber norms (GGE and OEWG).
 - 
                            
    Securing Humanitarian Operations: Preparedness and Response to Cyber Crises in Aid Delivery
    
    
How do humanitarian organisations adapt cyber incidents to their specific priorities and needs, and how can they adapt strategies of other organisations?
 - 
                            
    Toward an Aesthetics by Algorithms—Palestinian Cyber and Digital Spaces at the Threshold of (In)visibility
    
    
Chapter by Fabio Cristiano and Emilio Distretti for the volume The Aesthetics and Politics of the Online Self, edited by Donatella Della Ratta, Geert Lovink, Teresa Numerico, and Peter Sarram for Palgrave Macmillan.
 - 
                            
    Aria of the Dutch North Sea
    
    
Promotores: C. J. ten Cate; M. A. Ainslie. Co-promotor: W. Slabbekoorn
 - 
                            
    Urbanism and municipal administration in Roman North Africa
    
    
This project uses archaeological, literary and epigraphic evidence to investigate urban development in Roman-period North Africa, compiling this in a GIS-linked database in order to analyse the development of urban settlement spatially over time.
 - 
                            
    
    Marco RomagnaFaculty of Governance and Global Affairs
m.romagna@fgga.leidenuniv.nl | +31 70 800 9506
 - 
                            
    Islam in North Africa: A Critical Return to Youth
    
    
In recent years, and especially since the ‘Arab Spring’ of 2011, a growing body of research, media reporting, and scholarly literature has focused on the role of ‘Arab youth’ as the drivers of social and political movements across the Middle East and North Africa.
 - 
                            
    DSE 2.0: Towards Optimal Design of Complex, Distributed Cyber Physical Systems
    
    
DSE 2.0 concerns research on DSE techniques for complex dCPS
 - 
                            
    
    Shuang SunFaculty of Science
s.sun@liacs.leidenuniv.nl | +31 71 527 2727
 - 
                            
    Alumni Cyber Security Academy in AD "Cyber security is hot, and not only among nerds"
        
    
Cyber security is only for socially awkward nerds? Three alumni of the Cyber Security Academy prove the opposite.
 - 
                            
    Limiting Viral Spread: Automated Cyber Operations and the Principles of Distinction and Discrimination in the Grey Zone
    
    
Monica Kaminska, Dennis Broeders and Fabio Cristiano have contributed a chapter to the proceedings of the 13th International Conference on Cyber Conflict (CyCon 2021), which gathers 20 articles from the law, technology and strategy domains.
 - 
                            
    Countering cyber terrorism in a time of 'war on words': Kryptonite for the protection of digital rights?
    
    
This collection includes six short policy-focused contributions exploring how legislation and policy on counter cyber terrorism unfold at the national level in the United States, the United Kingdom, China, Russia, France, and at the regional level of the European Union.
 - 
                            
    Unlock the cyber crisis: Developing the prototype of an escape room-style cooperative game for cybersecurity education
    
    
The project aims to develop an escape room-style game to teach students cyber crisis management and prepare them for real-world cybersecurity challenges
 - 
                            
    How can we increase the financial sector’s resilience to cyber attacks? Get inside the mind of a hacker!
    
    
The financial sector is an appealing target for hackers. For that reason, lawmakers and regulators are going to great lengths to make the sector more resilient to cyber attacks. One recent measure was the introduction of the Digital Operational Resilience Act (DORA). This new EU regulation is extremely…
 - 
                            
    Call for papers: The Hague Program for Cyber Norms Conference
        
    
This year The Hague Program for Cyber Norms organises the first conference of an annual series to encourage academic diversity in the study of cyber security. The theme is Responsible Behavior in Cyberspace. The conference will take place in The Hague from 5 to 7 November 2018. Deadline submission of…
 - 
                            
    Successful Conference on International Cyber Security 2022
        
    
The Hague Program on International Cyber Security focuses on the various modes of governance that states and other actors can bring into play to deal with and shape the strategic challenges in the digital environment. This years conference focused on international cyber security and the role of the…
 - 
                            
    Cyber Security Governance Essentials
        
    
The new minor 'Cyber Security Governance Essentials' will start in September 2021. Third year bachelor students of The Leiden Institute of Advanced Computer Science (LIACS) and of the BSc Security Studies of the Institute of Security and Global Affairs (ISGA) who would like to deepen their knowledge…
 - 
                            
    Start fourth cohort executive Master’s programme Cyber Security
        
    
Cyber Security challenges are dominating the international agendas. Therefore, the Cyber Security Academy (CSA) enthusiastically and proudly announces that on Thursday 18th January a fourth group of 26 professionals from a variety of public and private organisations will start the executive Master’s…