31 search results for “cybersecurity” in the Public website
-
Cybersecurity
In what ways do matters of cybersecurity affect the relationship between governments and citizens, have a bearing on (fundamental) rights and civil liberties, and alter the role and responsibilities of governments?
-
Cyber-noir: Cybersecurity and popular culture
New article on popular culture influences on cybersecurity experts, available Open Access at Contemporary Security Policy, part of a special issue edited by dr. Myriam Dunn Cavelty.
-
A systematic review of current cybersecurity training methods
This article presents a systematic review aiming to provide a comprehensive overview of cybersecurity training methods and assess their effectiveness.
-
Assessing the effect of cybersecurity training on End-users: A Meta-analysis
Julia Prümmer, Tommy van Steen & Bibi van den Berg evaluate the effectiveness of cybersecurity training programs for end-users.
-
Developing a behavioural cybersecurity strategy: A five-step approach for organisations
This article presents a five-step framework for building behavioural cybersecurity strategy to reduce human-related risks affecting organisational security
-
The pervasive informality of the international cybersecurity regime: Geopolitics, non-state actors and diplomacy
In this article, the authors analyse two major factors that deepen informality, namely multipolar geopolitics and the rise of non-state actors.
-
Security by behavioural design
In 2021, the National Cyber Security Centre (NCSC) asked Leiden University to conduct a rapid review of best practices and possibilities for follow-up research on the integration of behavioral sciences in security by design methodologies and projects. This academic field is called security by behavioral…
-
Universiteit Leiden introduceert eerste bacheloropleiding Cybersecurity & Cybercrime
Vanaf september 2025 biedt de Faculteit Governance and Global Affairs de bacheloropleiding Cybersecurity & Cybercrime aan. Deze unieke Nederlandstalige opleiding leidt studenten op tot veelzijdige cyberexperts. ‘Er is veel vraag naar specialisten op het gebied van cybersecurity en cybercrime’.
-
Does protection motivation predict self-protective online behaviour? Comparing self-reported and actual online behaviour using a population-based
Rutger Leukfeldt, special chair of Governing Cybercrime, and colleagues investigate the link between Protection Motivation Theory (PMT) factors and self-protective online behavior.
-
Bottlenecks and opportunities for improvement in cybercrime handling: Insights from Dutch police practice
The authors examine the handling of cybercrime cases by law enforcement officers, focusing on bottlenecks and potential improvements noted by experts in the field.
-
Bibi van den BergFaculty of Governance and Global Affairs
b.van.den.berg@fgga.leidenuniv.nl | 070 8009500
-
Damien Van PuyveldeFaculty of Governance and Global Affairs
d.t.n.van.puyvelde@fgga.leidenuniv.nl | 070 8009500
-
Sergei BoekeFaculty of Governance and Global Affairs
s.boeke@fgga.leidenuniv.nl | 070 8009500
-
Dennis BroedersFaculty of Governance and Global Affairs
d.w.j.broeders@fgga.leidenuniv.nl | 070 8009030
-
Cyber Governance and National Security: Intervening in Ungoverned Spaces
The Netherlands Ministry of Defense and Ministry of Security and Justice have requested the Centre for Terrorism and Counterterrorism to complete a research project on cyber governance from a policy perspective. The results of this project will contribute to the deliverables of the fourth International…
-
Transitioning from Military Interventions to Long-Term Counter-Terrorism Policy
In December 2014, Leiden University’s Institute of Security and Global Affairs with the Australian National University’s Asia-Pacific College of Diplomacy and the International Centre for Counter-Terrorism, commenced a research project to assess how (temporary) military interventions can best prepare…
-
Jeroen WolbersFaculty of Governance and Global Affairs
j.j.wolbers@fgga.leidenuniv.nl | 070 8009500
-
Benjamyn I. ScottFaculteit der Rechtsgeleerdheid
b.i.scott@law.leidenuniv.nl |
-
A coalition of the unwilling? Chinese and Russian perspectives on cyberspace
The Hague Program for Cyber Norms, a research program at the Institute of Security and Global Affairs, published its second policy brief, in which Dennis Broeders, Liisi Adamson and Rogier Creemers explore aspects of the relationship between China and Russia in cyberspace.
-
Tommy van SteenFaculty of Governance and Global Affairs
t.van.steen@fgga.leidenuniv.nl | 070 8009500
-
‘Cyberspace is more than just technology’
How can a society protect itself from cyber threats? Sixty talented young researchers and professionals are learning more about this at the International Cyber Security Summer School in The Hague.
-
Distinctive user groups
What legislative and regulatory questions arise when children, adolescents or elderly people use the Internet?
-
Simon WillmettsFaculty of Governance and Global Affairs
s.d.willmetts@fgga.leidenuniv.nl | 070 8009500
-
Hans FrankenFaculteit der Rechtsgeleerdheid
h.franken@law.leidenuniv.nl | 071 5278838
-
Foreign intelligence in the digital age. Navigating a state of 'unpeace'.
The Hague Program for Cyber Norms, a research program at the Institute of Security and Global Affairs, published its first policy brief, in which Dennis Broeders, Sergei Boeke and Ilina Georgieva explore the role of intelligence agencies in cyberspace and the (im)possibilities of oversight and regulation…
-
Revisiting past cyber operations in light of new cyber norms and interpretations of international law: inching towards lines in the sand?
This article traces the evolution of interpretations of international law and international cyber norms on responsible state behaviour in cyberspace by reassessing five major – and allegedly state-led – cyber operations: Stuxnet 2010; Belgacom 2013-2014, the Ukrainian power grid 2015, the US presidential…
-
Francien DechesneFaculteit der Rechtsgeleerdheid
f.dechesne@law.leidenuniv.nl | 071 5277608
-
Transdisciplinary Perspectives on Validity: Bridging the Gap Between Design and Implementation for Technology-Enhanced Learning Systems
Technologies that help to enhance our educational environments can be found everywhere.
-
Vulnerability in open-source code has been floating around for 15 years: ‘This shows how complex security really is’
Researchers at LIACS have found a vulnerability in open-source code that’s been used around the world for over 15 years. They’ve also developed an AI-based tool to fix the problem automatically. ‘You really can’t afford to lean back.’
-
Mohammed Raiz ShaffiqueFaculteit der Rechtsgeleerdheid
m.r.shaffique@law.leidenuniv.nl | 071 5272727
-
Rogier CreemersFaculty of Humanities
r.j.e.h.creemers@hum.leidenuniv.nl | 071 5272850