513 search results for “cyber warfare” in the Public website
-
From Conflict Termination to Peacemaking: Role and Contours of a Contemporary Jus Post Bellum (or The Jus Post Bellum Project)
Should the law and norms applicable to armed conflict include a distinct category covering the transition from armed conflict to peace, jus post bellum, and if so what are its characteristics?
-
Projects
Staff members and affiliates of the Leiden University Centre for Digital Humanities are involved with a variety of digital research projects. Some of them are featured below:
-
Systems and Security
Researchers at LIACS are working to devise the computers of tomorrow that will be the backbone of the Cloud and Edge computing paradigms as well as the Internet of Things. In this respect, we are involved in research and development of high performance computing systems, embedded & real-time computing…
-
Restraint under conditions of uncertainty: Why the United States tolerates cyberattacks
This new article by Monica Kaminska is part of a special issue for Journal of Cybersecurity, based on a selection of contributions from THe Hague Program for Cyber Norms' 2019 Conference.
- About this minor
-
Universiteit Leiden Academy
Education for professionals. Leiden University offers a wide range of courses to boost your career, learn new skills, or broaden your knowledge.
-
5 – 7 November Responsible Behaviour in Cyberspace: Novel Horizons
From 5 – 7 November the The Hague Program for Cyber Norms will take place at Het Spaansche Hof in the Hague. The theme this year is Behaviour in Cyberspace: Novel Horizons.
- Tuition Fees
-
Admission requirements
To be eligible for the executive master’s programme in Cyber Security at Leiden University, you must meet the following admission requirements..
-
Modular learning: Enrolling in a single course
Do you want to be part of this unique programme, discuss cutting-edge topics of cyber security with other professionals, but do you not have time to enroll in this full master programme?
-
About the programme
The academic executive master’s programme Cyber Security is multidisciplinary; the programme covers technological as well as legal, administrative, economic and psychological aspects of digital security.
-
Diplomatic Negotiation – Essence and Evolution
Negotiation can only really be an alternative to warfare, if the parties agree on a framework of rules and procedures. And if the confidence of the partners may increase in another. But negotiations continue to wage war by peaceful means.
-
Why Leiden University?
The executive master’s programme in Cyber Security is unique in its integral approach and its professional ties and focus.
-
Governing Cyberspace: Behavior, Power and Diplomacy
Governing Cyberspace: Behavior, Power and Diplomacy is based on a selection of papers presented during The Hague Program for Cyber Norms' inaugural conference Novel Horizons: Responsible Behaviour in Cyberspace from 5-7 November 2018 in The Hague. The volume is edited by Dennis Broeders and Bibi van…
-
Programme structure
This one-year, English-taught Master's programme offers insights on general developments as well as the specific challenges in the field of the governance of crisis and security, with in-depth knowledge of sub-fields of crisis and security management.
- Conflict, Peace and Security
-
Questions of Justice in Law, Literature and the Arts
Questions of justice are not only the concern of legal professionals, politicians and activists, they also permeate culture at large. Literature, Cinema, Music and Artworks often revolve around questions about rights, justice and fairness, raising a wide range of issues, such as: how do we understand…
-
Admission and Application
Find out how to apply for Cyber Security at Leiden University by following our step-by step guide.
-
Healthcare robots and AI
Healthcare robots and AI is a project that investigates the legal and regulatory aspects of healthcare robot and Artificial Intelligence (AI) technologies
-
The Facebook scandal: guidance and tips
Facebook is under attack due to the scandal with Cambridge Analytica: Data of tens of millions of users have been leaked. Does this mean the end of Facebook? ‘The storm will pass,’ says security expert Erik van der Kouwe. He provides tips on how to keep Facebook from following your every move.
-
Who sets the security agenda?
Leiden University is organising two international conferences on security from 7 to 10 November in The Hague. Power relations, negotiating with extremists, cyber espionage, and the experience of a real crisis situation are some of the issues on the agenda. The conferences will be opened by Mayor Jozias…
-
Cyber-Security-by-Integrated-Design (C-SIDe) project
Cyber-attacks, privacy-related problems or failures in functioning: many technologies that are used every day have security issues that are solved when the software is already in use. An interdisciplinary project, in which Olga Gadyatskaya, Harry Wijshoff, Alex Uta and Kristian Rietveld from the Leiden…
-
A coalition of the unwilling? Chinese and Russian perspectives on cyberspace
The Hague Program for Cyber Norms, a research program at the Institute of Security and Global Affairs, published its second policy brief, in which Dennis Broeders, Liisi Adamson and Rogier Creemers explore aspects of the relationship between China and Russia in cyberspace.
-
International Law and Cybersecurity Governance
This edited publication aims at reflecting on the future of discussions on the applicability of international law to States’ use of ICTs in the context of highly politicised discussions at the multilateral level and offering practical suggestions for the European Union to pursue its objectives in this…
-
Bibi van den Berg about the digital war between Russia and the Ukraine
The war between Russia and Ukraine plays out not only physically but also digitally. Van Den Berg, Professor of Cybersecurity Governance at the FGGA, talked about it at several news outlets.
-
Education
The Institute of Security and Global Affairs (ISGA) offers courses at both bachelor’s and master’s level. There are also minors, online learning and courses for professionals.
-
Non-examination courses
As a non-examination student of MSc Cyber Security you can join our introductory courses without taking part in the course assignments and without taking the exam. At the end you receive a participation certificate, which does not contain any study results (as no exam was taken).
-
Leiden Embedded & Real-time Computing (LERC)
Leiden Embedded & Real-time Computing (LERC) is an expert lab and leader in advanced research on embedded and real-time systems and software. The main mission of LERC is by its research to contribute in a highly innovative way to the system-level design of embedded and cyber-physical systems and software…
-
Cyber Persistence Theory: redefining national security in cyberspace
Lecture
-
Bart Custers
Faculteit Rechtsgeleerdheid
b.h.m.custers@law.leidenuniv.nl | +31 71 527 8838
-
Provinces leaky as sieves
‘We may have gone a bit overboard with protective legislation’. According to Bibi van den Berg, Professor Cybersecurity Governance at Leiden University, the sanctions that can be imposed when failing to report a data leak are so severe that organizations tend to cramp up when faced with a possible l…
-
An Algebra for Interaction of Cyber-Physical Components
PhD defence
-
Between the Court and the Village: Uncovering how was Early Modern Warfare Really Waged in Southeast Asia
Lecture, COGLOSS
- Contact
-
‘Universities and government should take the lead in the fight against cybercrime’
From ransomware to Citrix traffic jams: over the past few months Dutch organisations were regularly brought to a standstill by serious cyber attacks. We can only face these threats by standing as one, and universities and government should take the lead. These are the words of Leiden professors Bibi…
-
Security and threat
Polarisation in our society is on the rise. What makes people increasingly radical? How do we protect ourselves from extremist, terrorist or criminal threats, be they physical or in the cyber world? And what role do intelligence services play in this?
-
Open Consultation on UN GGE 2015 Norm Proposals
The Leiden University’s Program for Cyber Norms, a research platform to investigate the development and implementation of law and policy applicable to uses of ICTs, in cooperation with the think-tank ICT4Peace conducted a global open consultation on how to implement the UN Group of Governmental Experts’…
-
Introductie webinar cyber security
Study information
-
Education
The programmes offered by the Faculty of Governance and Global Affairs in The Hague are closely linked to the defining image of The Hague as a city of international justice, peace and security as well as the centre of Dutch public administration and international governance.
-
The Oxford Handbook of the European Bronze Age
The handbook is a wide-ranging survey of a crucial period in prehistory during which many social, economic, and technological changes took place. Written by specialists in the field, the book provides coverage both of the themes that characterise the period, and of the specific developments that took…
-
The Indian Frontier: Horse and Warband in the Making of Empires
This omnibus brings together some old and some recent works by Jos Gommans on the warhorse and its impact on medieval and early modern state-formation in South Asia.
-
Studies in Global Slavery / Series
This series provides a venue for scholarly work—research monographs and edited volumes—that advances our understanding of the history of slavery and post-slavery in any period and any geographical region. It fills an important gap in academic publishing and builds upon two relatively recent developments…
-
International conference 'Who determines the security (research) agenda?' 9-10 November: registration open
The Institute of Security and Global Affairs (ISGA) organizes the ISGA Conference ‘Who determines the security (research) agenda’ on 9 - 10 November 2016 in The Hague, the Netherlands.
-
The pervasive informality of the international cybersecurity regime: Geopolitics, non-state actors and diplomacy
In this article, the authors analyse two major factors that deepen informality, namely multipolar geopolitics and the rise of non-state actors.
-
Els de Busser on Panel during EuroDIG 2019
On 20 June 2019, dr. Els De Busser was a panelist during the EuroDIG 2019 Conference in The Hague at the World Forum.
-
Experts on the war in Ukraine, two years later: ‘Europe learned a lot from the war, help each other and don’t give up’
The one-day symposium ‘War in Europe: the impact of Russian aggression in Ukraine two years on’ on 23 February 2024
-
Bachelor
At eLaw, Center for Law and Digital Technologies, we provide electives in the Bachelor 'Rechtsgeleerdheid'.
-
Online Course Risk in Modern Society
Risk has become one of the defining features of modern society. This course examines various types of safety and security risks, and how these are perceived and dealt with in a wide array of professional and academic fields, ranging from criminology, counter-terrorism and cyber security, to philosophy,…
-
Online Course Safety & Security Challenges in a Globalized World
Security and safety challenges rank among the most pressing issues of modern times. Challenges such as cyber-crime, terrorism, and environmental disasters impact the lives of millions across the globe. The course will introduce you to this broad theme in an increasingly complex world.
-
Helena Ursic will speak on a panel focused on the Cambridge Analytica scandal
Recently, Facebook and Cambridge Analytica have become highly polarizing figures in a data privacy scandal of global (and potentially historic) proportions. What does the Facebook and Cambridge Analytica controversy tell us about data privacy and cybersecurity in the age of Big Data?