1,618 search results for “cyber norms” in the Public website
-
Bakker, ‘Do liberal norms matter?’, Acta Politica 2016
An experimental comparison of the impact of liberal norms on a population residing and socialised within a democracy (the Netherlands) with a population in an autocracy (China) and their respective supports for war with another state shows that the level of liberal norms in the democratic experimental…
-
Peace Mediators as Norm Entrepreneurs: The EU's Norm Diffusion Strategy in Montenegro's Referendum on Independence
On a referendum held on May 21, 2006, 55.5% of voters in Montenegro voted in favor of their country’s independence. While in numerical terms the outcome shows overwhelming support for independent Montenegro, from a normative standpoint it was a narrow win. The normative framework that regulated rules…
-
Securing Humanitarian Operations: Preparedness and Response to Cyber Crises in Aid Delivery
How do humanitarian organisations adapt cyber incidents to their specific priorities and needs, and how can they adapt strategies of other organisations?
-
Launch of the seventh edition of the European Cyber Security Perspectives
On 4 March, KPN published the seventh edition of the European Cyber Security Perspectives. Els De Busser and Tommy van Steen, both Assistant Professors at the Institute of Security and Global Affairs, have contributed an article on interdisciplinarity.
-
Heteronormativity and gender norms: socialization across countries, at school, and within the family
To what extent are individuals socialised with heteronormativity and gender norms by the national context in which they live, by Dutch schoolbooks, and within Dutch families?
-
A coalition of the unwilling? Chinese and Russian perspectives on cyberspace
The Hague Program for Cyber Norms, a research program at the Institute of Security and Global Affairs, published its second policy brief, in which Dennis Broeders, Liisi Adamson and Rogier Creemers explore aspects of the relationship between China and Russia in cyberspace.
-
Marco RomagnaFaculty of Governance and Global Affairs
m.romagna@fgga.leidenuniv.nl | 071 5272727
-
Daniel Thomas, 'Beyond Identity: Membership Norms and Regional Organisation', European Journal of International Relations
Article by Leiden University political scientist Daniel Thomas about shifting norms for membership in international organisations.
-
Diana KimFaculty of Social and Behavioural Sciences
d.a.kim@fsw.leidenuniv.nl | 071 5272727
-
Els de Busser on Panel during EuroDIG 2019
On 20 June 2019, dr. Els De Busser was a panelist during the EuroDIG 2019 Conference in The Hague at the World Forum.
-
The (im)possibilities of addressing election interference and the public core of the internet in the UN GGE and OEWG
Article by Dennis Broeders in the Journal of Cyber Policy on the (im)possibilities of addressing election interference and the public core of the internet in the UN GGE and OEWG.
-
DSE 2.0: Towards Optimal Design of Complex, Distributed Cyber Physical Systems
DSE 2.0 concerns research on DSE techniques for complex dCPS
-
Restraint under conditions of uncertainty: Why the United States tolerates cyberattacks
This new article by Monica Kaminska is part of a special issue for Journal of Cybersecurity, based on a selection of contributions from THe Hague Program for Cyber Norms' 2019 Conference.
-
On the Term 'Environmental Refugee': Normative Assumptions and Empirical Realities
The authors compare assumptions about normative utility of the term 'environmental refugee' with empirical evidence compared to 'environmental migrant'.
-
Shuang SunFaculty of Science
s.sun@liacs.leidenuniv.nl | 071 5272727
-
Alumni Cyber Security Academy in AD "Cyber security is hot, and not only among nerds"
Cyber security is only for socially awkward nerds? Three alumni of the Cyber Security Academy prove the opposite.
-
Unlock the cyber crisis: Developing the prototype of an escape room-style cooperative game for cybersecurity education
The project aims to develop an escape room-style game to teach students cyber crisis management and prepare them for real-world cybersecurity challenges
-
Successful Conference on International Cyber Security 2022
The Hague Program on International Cyber Security focuses on the various modes of governance that states and other actors can bring into play to deal with and shape the strategic challenges in the digital environment. This years conference focused on international cyber security and the role of the…
-
How can we increase the financial sector’s resilience to cyber attacks? Get inside the mind of a hacker!
The financial sector is an appealing target for hackers. For that reason, lawmakers and regulators are going to great lengths to make the sector more resilient to cyber attacks. One recent measure was the introduction of the Digital Operational Resilience Act (DORA). This new EU regulation is extremely…
-
Quantum computing, norms and polynomials
In this thesis, Quantum computing, norms, and polynomials, we investigate the interplay between quantum mechanics, complexity theory, and functional analysis, three central areas of physics, computer science, and mathematics, respectively.
-
systematic literature review of security and privacy by design principles, norms, and strategies for digital technologies
The article offers a comparative systematic literature review of the principles, norms, and strategies associated with Security by Design and Privacy by Design
-
Setting the standard: norms and usage in Early and Late Modern Dutch (1550-1850)
On the 2nd of April, Eline Lismont successfully defended a doctoral thesis. Leiden University Centre for Linguistics congratulates Eline on this achievement!
-
Parto MirzaeiFaculty of Governance and Global Affairs
p.mirzaei@fgga.leidenuniv.nl | 070 8009506
-
Rutger LeukfeldtFaculty of Governance and Global Affairs
e.r.leukfeldt@fgga.leidenuniv.nl | 070 8008206
-
Cyber Security Governance Essentials
The new minor 'Cyber Security Governance Essentials' will start in September 2021. Third year bachelor students of The Leiden Institute of Advanced Computer Science (LIACS) and of the BSc Security Studies of the Institute of Security and Global Affairs (ISGA) who would like to deepen their knowledge…
-
Start fourth cohort executive Master’s programme Cyber Security
Cyber Security challenges are dominating the international agendas. Therefore, the Cyber Security Academy (CSA) enthusiastically and proudly announces that on Thursday 18th January a fourth group of 26 professionals from a variety of public and private organisations will start the executive Master’s…
-
Cyber offenders: Unique profile, unique approach?
Our society can no longer not imagine the threat of cybercrime. Banks, companies, and schools are hacked, or 'DDoSed', with increasing regularity and data is being stolen or taken hostage. To respond adequately to this threat, we need more knowledge of the perpetrators.
-
International Cyber Security Summer School 19 – 24 Augustus 2018
From 19 to 24 August 2018, the fourth edition of the International Cyber Security Summer School, will take place. During this six-day long event, you will follow lectures, work on challenging group assignments provided by different organisations, hear insiders’ perspectives, do some fun social activities…
-
Graduation Ceremony Interdisciplinary Master Cyber Security
On Thursday 7 February 2019, the graduation ceremony for the executive master programme Cyber Security took place at The Hague Security Delta (HSD). The Cyber Security programme is a collaboration of University Leiden, Delft University of Technology, and The Hague University of Applied Sciences. A total…
-
Language Use, Usage Guides and Linguistic Norms
Language Use, Usage Guides and Linguistic Norms will be of interest to scholars of language use in both the past and the present, as well as to anyone interested in the interplay between actual language use and prescriptive attitudes towards language.
-
Instrumental and normative pathways to compliance
On 31 March 2022, Bo Terpstra defended the thesis 'Instrumental and normative pathways to compliance'. The doctoral research was supervised by Prof. K.P. Goudswaard.
-
Identification-imitation-amplification: understanding divisive influence campaigns through cyberspace
Jelena Vićić and Richard Harknett offer an analytical construct to better understand the mechanism by which cyber-enabled influence operations work
-
Manipulating uncertainty: cybersecurity politics in Egypt
This new article by Bassant Hassib and James Shires is part of a special issue for Journal of Cybersecurity, based on a selection of contributions from THe Hague Program for Cyber Norms' 2019 Conference.
-
international organizations: How UN peace operations respond to global normative change and shifting power distributions
Buitelaar argues that IOs micro-level discourse adapts imperfectly to macro-level changes, balancing adaptation to pressures with commitment to values.
-
Bibi van den Berg on the necessity of a Delta Programme Cyber Security
On Monday 9 September, the Dutch Scientific Council for Government Policy (WRR) published its report 'Voorbereidingen op digitale ontwrichting' (Preparing for digital disruption). The report shows that our infrastructure is not secure enough to withstand digital threats and that we are lacking a clear…
-
Why are some civil servants more committed to professional norms than others?
This project aims to explore, in general, what explains civil servants’ attitudes and behavior, and, in particular, why some civil servants are more committed to professional norms and public service values – such as impartiality, equity, efficiency, and innovation – than others.
-
Launch of the sixth edition of the European Cyber Security Perspectives
On 12 March, KPN published the sixth edition of the European Cyber Security Perspectives. Sergei Boeke, researcher at the Institute of Security and Global Affairs, has written an article about Cyber Warfare.
-
Dennis BroedersFaculty of Governance and Global Affairs
d.w.j.broeders@fgga.leidenuniv.nl | 070 8009030
-
Cybersecurity threats, challenges, and strategies in humanitarian operations: A scoping review
In this article, Chiara Anfuso, Andrea Bartolucci, Cristina del Real, and Sanneke Kuipers examine cyber threats in humanitarian aid, exploring how digitalisation increases vulnerability and assessing the challenges organisations face in strengthening cybersecurity and response strategies.
-
Lena RieckeFaculty of Governance and Global Affairs
l.riecke@fgga.leidenuniv.nl | 070 8009506
-
Nele MentensFaculty of Science
n.mentens@liacs.leidenuniv.nl | 071 5274799
-
Graduation Second Cohort Cyber Security
The Cyber Security Academy, therefore, proudly and enthusiastically announces that on 8 February the second cohort of Master of Science (MSc) graduates in Cyber Security in the Netherlands will graduate at the Campus of The Hague Security Delta (HSD), the national innovation centre in The Hague and…
-
Els de Busser receives NWO-funding for project in solving cyber security issues
Dr. Els de Busser, assistant professor and researcher at the Institute of Security and Global Affairs, as principal investigator of a consortia, has been awarded 1.45 million euros for a project called C-SIDe.
-
FGGA's Cyber Week: research and innovation for a better digital world
During Cyberweek, from 17-24 October, the Faculty of Governance and Global Affairs (FGGA) highlighted its research and teaching on cybersecurity, digital developments, and their impact on society.
-
dead can tell us: on ancestor worship, law, social status and gender norms in Ancient Egypt
On Wednesday 3 July 2024 Renata Schiavo successfully defended a doctoral thesis and graduated.
-
Bart Custers @ Cyber Summit 2016
This year’s theme of the Cyber Summit is: “Using Technology Responsible”. The Cyber Summit will take place in Banff, Canada on October 26th-28th. Dr. Bart Custers, associate professor and head of research at eLaw, the Center for Law and Digital Technologies, is invited to give a presentation on privacy…
-
Negotiating Fiscal Norms, Property and Labour in Eighteenth-Century Dutch Colonial Sri Lanka
This project focuses on Dutch registration of land and people in rural Sri Lanka. How did the practice of “fixating” the fluid social relations and dynamic daily practices into categories affect family strategies of reproduction and survival?
-
Executive Cyber Security Master still on trend
Four years ago, the Institute of Security and Global Affairs (ISGA) first started with an executive master’s programme called Cyber Security. The programme proved to be a huge success and has continued to develop. This academic year, Els de Busser was appointed as Educational Director and Chantal de…
-
New Master: Master Cyber Security Engineering
In cooperation with Cyber Security Academie (CSA) and The Hague University of Applied Sciences the new Master Cyber Security Engineering is established and starts in September 2018.
-
Blog Post | Cyber-diplomacy: A Field in Flux
Three decades ago, cyber-diplomacy did not exist. The interest in Information and Communication Technology (ICT) as a vector of change in international relations was limited to a few mostly technical organisations, and a restricted number of states.