1,111 search results for “cyber north” in the Public website
-
Bálint HonosFaculty of Humanities
-
The unexpected norm-setters: Intelligence agencies in cyberspace
Ilina Georgieva published an article in the journal Contemporary Security Policy on the norm-setting role of intelligence agencies.
-
information system for the integrated analysis of land use change in the Far North of Cameroon
Promotores: W.T. de Groot, M. Tchuenté, Co-promotor: J.P. Cheylan
-
What are cyber norms?
Interview with prof.dr. Dennis Broeders in magazine De Veiligheidsdiplomaat (The Security Diplomat)
-
Foreign intelligence in the digital age. Navigating a state of 'unpeace'.
The Hague Program for Cyber Norms, a research program at the Institute of Security and Global Affairs, published its first policy brief, in which Dennis Broeders, Sergei Boeke and Ilina Georgieva explore the role of intelligence agencies in cyberspace and the (im)possibilities of oversight and regulation…
-
Language policy and practices in the Global North and South: Challenges, opportunities and future directions
A thorough description of the relationships among languages and their social environment in a given context, reflecting an ecological perspective, involves attention to the agency of local actors, and the policies, discourse, and ideologies that surround them.
-
the Fisheries Sector and Mitigation of Conflicts within the Sector in North Cameroon
Promotores: Prof.dr. G.A. Persoon & Prof. dr. H.H. de Iongh
-
Nele MentensFaculty of Science
-
Lena RieckeFaculty of Governance and Global Affairs
-
North Korea: strategy, scoundrels and internment camps
The threats from North Korea have become so serious that the US and South Korea may feel compelled to respond. Remco Breuker, Leiden Professor of Korean Studies, would like to see a European mediator.
-
Prehistoric settlement patterns around the southern North Sea
Papers presented at a colloquium, held in honour of Professor Dr. P.J.R. Modderman, Leiden, 3-7 May 1982.
-
The urban system in the North Western provinces
The first objective is to create a catalogue raisonée, i.e. a structured database that will store the main attributes of each town in a standardized format database, which will be freely accessible when completed; the second objective is to exploit theories and methods that can help us to understand…
-
Dutch ships built by North Koreans in Polish shipyards
North Korean labourers are still being forced to work in the European Union. According to researchers, including Professor of Korean Studies Remco Breuker at Leiden University, Dutch companies are buying ships from a dockyard that uses North Korean workers.
-
Is the mining industry the route to influence North Korea?
North Korean detention camps are no different from Nazi prison camps. But as long as the country remains economically isolated, international criticism will be ineffective, writes North Korea expert Remco Breuker in the opinion section of Dutch newspaper NRC on 21 February. Breuker advocates using the…
-
Isabella BrunnerFaculty of Governance and Global Affairs
-
Leiden LL.M. students hand over IHL clinic report on “Cyber Warfare” to the Netherlands Red Cross
On Thursday, 17 September 2015, the latest project of the Leiden International Humanitarian Law Clinic (the IHL Clinic) on ‘Principles of International Humanitarian Law applied to Cyber Warfare’ was concluded and presented to the Netherlands Red Cross.
-
Gender equality, cybersecurity, and security sector governance
In this article, James Shires and Tatiana Tropina, assistant professors at the Institute of Security and Global Affairs, map the relationship between gender equality and cybersecurity governance as a component of good security sector governance (SSG). Here, it highlights the way in which cybersecurity…
-
Start Second Cohort Executive Master's Programme Cyber Security
On January 14th the executive Master’s programme Cyber Security started for the second time at the HSD Campus
-
Fieldwork in North Korea
It is difficult to get access to North Korea. That makes scientific fieldwork very difficult. Korea expert Valérie Gelézeau shared her experiences during a lunch lecture at the International Institute for Asian Studies (IIAS) on 16 February.
-
eLaw investigates cyber agent technology for secret services
Tracks Inspector, a Dutch company that develops innovative software, commissioned research to eLaw to investigate the use of cyber agent technology for intelligence agencies and secret services.
-
How North Korea forces labourers to work in Poland
Leiden researchers discovered that North Korean labourers are being forced to work on a large scale in Poland. Professor of Korea Studies Remco Breuker will present a report on the abuses in Poland at the ‘Slaves To The System’ conference on 6 July.
-
Blog Post | Cyber-diplomacy: A Field in Flux
Three decades ago, cyber-diplomacy did not exist. The interest in Information and Communication Technology (ICT) as a vector of change in international relations was limited to a few mostly technical organisations, and a restricted number of states.
-
Freedom AND Security - Conference Report Published by Europol
On 22 November 2018, Els De Busser spoke at a panel during the conference
-
Presentation at Korea-Netherlands Cyber Dialogue in Seoul
On 12 April, GTGC's chair, Prof. Jan Aart Scholte, took part in, and presented at, the Korea-Netherlands Cyber Dialogue in Seoul, South Korea.
-
North Korean exiles expose the regime’s rationale at Leiden conference
Seven prominent North Korean exiles will shed new light on the dictatorial state in a conference hosted by Leiden University on 17 and 18 September. All of the speakers once held high-ranking positions in the regime and now reveal its inner workings.
-
'The North Korean regime will collapse within five to seven years’
The greatest threat to the North Korean regime is not the outside world but its own developing private market and the growing frictions at the top. This was the argument put forward by North Korean exile Jang Jin-sung in his lecture in Leiden on 18 September 2014.
-
Remco Breuker: 'North Korea is not a state. It's a company'
How to deal with the Pyongyang regime? Is North Korea irrational? Prof. Remco Breuker proposes a new approach.
-
North Holland settlement re-examined
Archaeologist Virginia García-Díaz made replicas of centuries-old tools to be able to study North Holland settlements from the corded-ware culture. PhD defence 23 February.
-
and Geospatial Analysis Techniques to Assess Wildfire Risk in Rural North Vietnam
Andrea Bartolucci is Assistant Professor at Institute of Security and Global Affairs. In this study, the scholars adopted a multidisciplinary approach to investigate wildfire risk in Van Chan district in northern Vietnam, a region where official data are sometimes difficult to collect or inconsisten…
-
‘Fire-free’ survival strategies for the early occupants of north-west Europe
In Europe, archaeological traces of fire become more frequent between 300,000 and 400,000 years ago; but could the earliest occupants have survived without fire for at least half a million years before this? How could the early occupants of Europe have kept warm and processed meat without fire?
-
Reworking Culture: Relatedness, Rites, and Resources in Garo Hills, North-East India
Reworking Culture: Relatedness, Rites, and Resources in Garo Hills, North-East India provides intimate insights into the lives of hill farmers and the challenges they face in day-to-day life. Focusing on the ongoing reinterpretation of traditions, or customs, the book critiques the all too often taken-for-granted…
-
Rights of the Relational Self: Law, Culture, and Injury in the Global North and South
Although official law generally conceives of personal injury victims as individual rights holders, the actual experience of physical injury and its consequences is relational. Indeed, many researchers in the global North as well as the global South have contended that the very concept of the Self should…
-
Developing a behavioural cybersecurity strategy: A five-step approach for organisations
This article presents a five-step framework for building behavioural cybersecurity strategy to reduce human-related risks affecting organisational security
-
In Between Digital War and Peace
In this article, Jasmijn Boeken, explores in which ways the defining characteristics of the different zones can be found in the digital sphere.
-
Nada HeddaneFaculty of Law
-
Nadia SonneveldFaculty of Law
-
1200 North Korean posters in one database
Korea specialist Koen De Ceuster has combined 1200 posters from North Korea in one database. He believes the posters are extremely valuable for researchers who want to make a more in-depth study of this closed country. The database will be launched on 15 June in Leiden.
-
Three tales of attribution in cyberspace. Criminal law, international law and policy debates
In this policy brief, Dennis Broeders, Els De Busser and Patryk Pawlak discuss attribution of in cyberspace from three different perspectives: criminal law, international law and policy. Published together with EU Cyber Direct.
-
North Korea uses ingenious constructions to supply forced labour to the EU
Companies in Poland employ North Korean forced labourers on a large scale. Some of these companies are supported by the European Union. These are the findings of a research team headed by Leiden Professor of Korean Studies Remco Breuker and employment lawyer Imke van Gardingen. The study is still ongoing…
-
The Hague Program for Cyber Norms successfully concludes their UN GGE norms commentary project
The Leiden University’s Program for Cyber Norms, a research platform to investigate the development and implementation of law and policy applicable to uses of ICTs, in cooperation with the think-tank ICT4Peace conducted a global open consultation on how to implement the UN Group of Governmental Experts’…
-
A Neandertal fossil from the north sea
A fragment of a human skull discovered in sediments extracted from the bottom of the North Sea, 15 km off the coast off the Netherlands, has been identified as belonging to the extinct Neandertal group.
-
Open Call: Creation of Two SPOCs (Small Private Online Course) for Cyber Specialization
For the cyber specialization within the master program Crisis and Security Management, the Institute of Security and Global Affairs (ISGA) seeks to provide two online courses (SPOCs) to ensure that all students will be on the same page when it comes to prior knowledge of the technicalities of cyber…
-
Maud RijksFaculty of Humanities
-
A coalition of the unwilling? Chinese and Russian perspectives on cyberspace
The Hague Program for Cyber Norms, a research program at the Institute of Security and Global Affairs, published its second policy brief, in which Dennis Broeders, Liisi Adamson and Rogier Creemers explore aspects of the relationship between China and Russia in cyberspace.
-
Olga GadyatskayaFaculty of Science
-
Data Breaches and Effective Crisis Communication: A Comparative Analysis of Corporate Reputational Crises
Online data breaches are recurrent and damaging cyber incidents fors organizations worldwide. This study examines how organizations can effectively mitigate reputational damages in the aftermath of data breaches by hacking, through situational crisis communication strategies.
-
From cyber to Syria: the many aspects of security
During the final session of the PRE-University Class Security Challenges in the 21st Century, students showcased their thorough analysis of contemporary safety and security challenges. The results were impressive, according to both the teachers and the assessors: ‘You almost forget that they’re high…
-
Why southern Africa is full of North Korean monuments
North Korean workers designed and built numerous monuments, museums and other buildings in southern Africa. This is clear from research by history student Tycho van der Hoog for his master's thesis. These monuments can be an important source of income for a country that has become quite isolated on…
-
Unmasking the Term 'Dual Use' in EU Spyware Export Control
This article illustrates how the term 'dual use' has become associated with a broader dichotomy between ‘legitimate’ and ‘illegitimate’ purposes.
- Managing the nuclear threshold: Non-nuclear allies in NATO decision-making