1,902 search results for “cyber north” in the Public website
-
Bottlenecks and opportunities for improvement in cybercrime handling: Insights from Dutch police practice
The authors examine the handling of cybercrime cases by law enforcement officers, focusing on bottlenecks and potential improvements noted by experts in the field.
-
The pervasive informality of the international cybersecurity regime: Geopolitics, non-state actors and diplomacy
In this article, the authors analyse two major factors that deepen informality, namely multipolar geopolitics and the rise of non-state actors.
- Gender Approaches to Cybersecurity: design, defence and response
-
Katharina NatterSocial & Behavioural Sciences
k.natter@fsw.leidenuniv.nl | 071 5276864
-
Cyberweek
From 16 to 23 October 2025, the Faculty of Governance and Global Affairs (FGGA) will host the second edition of Cyber Week. Following last year’s success, we will once again shine a daily spotlight on our teaching and research in the field of cybersecurity through LinkedIn and Instagram. Today’s societal…
-
Cyberweek
From 16 to 23 October 2025, the Faculty of Governance and Global Affairs (FGGA) will host the second edition of Cyber Week. Following last year’s success, we will once again shine a daily spotlight on our teaching and research in the field of cybersecurity through LinkedIn and Instagram. Today’s societal…
-
Els de Busser on Panel during EuroDIG 2019
On 20 June 2019, dr. Els De Busser was a panelist during the EuroDIG 2019 Conference in The Hague at the World Forum.
-
The Facebook scandal: guidance and tips
Facebook is under attack due to the scandal with Cambridge Analytica: Data of tens of millions of users have been leaked. Does this mean the end of Facebook? ‘The storm will pass,’ says security expert Erik van der Kouwe. He provides tips on how to keep Facebook from following your every move.
-
Leiden Embedded & Real-time Computing (LERC)
Leiden Embedded & Real-time Computing (LERC) is an expert lab and leader in advanced research on embedded and real-time systems and software. The main mission of LERC is by its research to contribute in a highly innovative way to the system-level design of embedded and cyber-physical systems and software…
-
Universiteit Leiden Academy
Education for professionals. Leiden University offers a wide range of courses to boost your career, learn new skills, or broaden your knowledge.
-
Shielding software systems: A comparison of security by design and privacy by design based on a systematic literature review
The authors systematically search and review relevant definitions of Security by Design (SbD) in comparison with Privacy by Design (PbD).
-
Healthcare robots and AI
Healthcare robots and AI is a project that investigates the legal and regulatory aspects of healthcare robot and Artificial Intelligence (AI) technologies
-
'The way it looks now, Kim Jong-un is the winner'
Something that a year ago would have been unthinkable has become a reality on 12 June: Donald Trump and Kim Jong-un sat down together to talk about nuclear disarmament. Can these two hardliners reach agreement in the negotiations? Professor of Korea Studies Remco Breuker is doubtful. 'As it looks now,…
-
'Dear Leader’ – but not really
On 8 May, the memoirs of Jang Jin-sung are appearing worldwide under the title Dear Leader. Jan Jin-sung was a member of the personal circle of the former North Korean leader, Kim Jong Il. Dear Leader provides a radically different perspective on the workings of the regime, as it reveals the moving…
-
Asia Academy #15: North Korea's Gamble
Lecture, LAC Asia Academy
-
Symposium on Cyber Security in Humanitarian Organizations in The Netherlands
Symposium
-
An Algebra for Interaction of Cyber-Physical Components
PhD defence
-
Fighting in God’s Name
This book underscores the interplay between religion and politics (local and global) in the production, escalation, management, mitigation, and resolution of conflict.
-
Open Consultation on UN GGE 2015 Norm Proposals
The Leiden University’s Program for Cyber Norms, a research platform to investigate the development and implementation of law and policy applicable to uses of ICTs, in cooperation with the think-tank ICT4Peace conducted a global open consultation on how to implement the UN Group of Governmental Experts’…
-
Call for Papers - Conflict Management in the Atlantic, the North Sea and the Baltic, 1200-1600: Actors, Institutions and Practices of Dispute
From the late Middle Ages onwards, maritime conflict has developed hand in hand with international trade. Over time, specific institutions were established to address disputes arising from violence or mishap at sea and in coastal areas. Conflict resolution at sea has mostly been studied through the…
-
2024 Conference on International Cyber Security: Democracy and Cyberspace
Conference
- Contact
-
Introductie webinar cyber security
Study information
-
Introductie webinar cyber security
Study information
-
Introductie webinar cyber security
Study information
-
Does protection motivation predict self-protective online behaviour? Comparing self-reported and actual online behaviour using a population-based
Rutger Leukfeldt, special chair of Governing Cybercrime, and colleagues investigate the link between Protection Motivation Theory (PMT) factors and self-protective online behavior.
-
Assessing the effect of cybersecurity training on End-users: A Meta-analysis
Julia Prümmer, Tommy van Steen & Bibi van den Berg evaluate the effectiveness of cybersecurity training programs for end-users.
-
Artificial Intelligence and International Conflict in Cyberspace
This edited volume explores how artificial intelligence (AI) is transforming international conflict in cyberspace.
-
The (im)possibilities of addressing election interference and the public core of the internet in the UN GGE and OEWG
Article by Dennis Broeders in the Journal of Cyber Policy on the (im)possibilities of addressing election interference and the public core of the internet in the UN GGE and OEWG.
-
In touch with the dead
A study of early medieval reopened graves
-
Helena Ursic will speak on a panel focused on the Cambridge Analytica scandal
Recently, Facebook and Cambridge Analytica have become highly polarizing figures in a data privacy scandal of global (and potentially historic) proportions. What does the Facebook and Cambridge Analytica controversy tell us about data privacy and cybersecurity in the age of Big Data?
-
Bart CustersFaculty of Law
b.h.m.custers@law.leidenuniv.nl | +31 71 527 8838
-
Jan van den BergFaculty of Governance and Global Affairs
j.van.den.berg@fgga.leidenuniv.nl | +31 70 800 9506
-
Eduard van de Bilt and Joke Kardux say goodbye to Leiden
For more than 35 years they helped put American Studies on the map: Joke Kardux and Eduard van de Bilt. This spring, the couple retired. A farewell interview.
-
The Invisible History of the United Nations and the Global South - INVISIHIST
The main aim of this project is to reveal and unravel the invisible histories of the UN, transcending the dominant Western perspective to recover the historical agency of Global South actors. The research will investigate how the UN has both facilitated and limited their role in shaping global order…
-
Streaming the Sagas: a live role play in the North-European Age of Heroes
Hwæt! You've heard of the adventures of the mighty Beowulf. You've heard of the brave folk standing beside him, and the awe-inspiring foes standing against him. But where their legend still lives, their tale ended long ago... Let us begin a new saga, let us find new heroes, weave a new story - by the…
-
Online Course Risk in Modern Society
Risk has become one of the defining features of modern society. This course examines various types of safety and security risks, and how these are perceived and dealt with in a wide array of professional and academic fields, ranging from criminology, counter-terrorism and cyber security, to philosophy,…
-
Online Course Safety & Security Challenges in a Globalized World
Security and safety challenges rank among the most pressing issues of modern times. Challenges such as cyber-crime, terrorism, and environmental disasters impact the lives of millions across the globe. The course will introduce you to this broad theme in an increasingly complex world.
-
Admission and application
Find out how to apply for North American Studies at Leiden University by following our step-by step guide.
-
Slopes, Sandy Beaches, and the Politics of Tourism in Kim Jong Un's North Korea
Lecture
-
Extracurricular
Get the most out of your studies at Leiden University by taking part in our extracurricular activities.
-
Book presentation: The world according to North Korea
Lecture, Boekpresentatie
-
THE BLACK ARCTIC
Since the Middle Passage is in the North Atlantic, and the North Atlantic has a relationship with the arctic, what relationship does the Arctic have with the Middle Passage? How can this relationship be used to provide a space of healing by uncovering Afro/diasporic counter narratives?
-
5 questions about bullying
From sleep problems to suicide attempts: the consequences of bullying can be very serious. The National Day against Bullying (in the Netherlands 19 April) is the opportunity for Leiden psychologist Mitch van Geel to share some recent insights from his research.
-
Ruth ClemensFaculty of Humanities
r.a.clemens@hum.leidenuniv.nl | +31 71 527 2165
-
A Descriptive grammar of Sumerian
This grammar describes Sumerian, an ancient Near Eastern language which was spoken in what is now southern Iraq, on the basis of written sources dating from about 2500 to 2000 BC.
-
Partnerships
At Campus The Hague, the University works closely with diverse parties and institutions in the city.
-
Give peace a chance
How is it possible that people kill each other? And above all: how is it possible that people who are able to peacefully live with each other at one moment, can kill each other at another one?
-
Addressing the elephant in the room. Cyber intelligence and international security
Inaugural lecture
-
Transboundary Crisis Management Capacities of the European Union
This project investigates the capacities of EU institutions to coordinate the responses of member states to critical events.