1,111 search results for “cyber north” in the Public website
-
View from abroad... Stephanie van den Akker visits North Korea
'If a local dares to speak to you, do interact, but mind what you say.' This was the advice given to Stephanie van den Akker, second-year student of International Studies, during her visit to North Korea. And yes, one local did actually speak to her, leaving her completely speechless.
-
Mesoamerica and the Andes: a search for early migratory relations between North and South America
The aim of the project is to unravel the genetic and contact relations between the indigenous languages of Mesoamerica (Mexico and western Central America) and the Middle Andes region (Ecuador, Peru, Bolivia), as part of a larger endeavor to understand the historical process of the peopling of the Americas…
-
The Unforeseen 2012 Crisis in Mali: The Diverging Outcomes of Risk and Threat Analyses
The 2012 crisis in Mali, where the state collapsed and terrorist groups took over the north, came as a surprise to many. Mali had been considered a poster-child for democracy and was judged as considerably more stable than its neighbors by leading quantitative indices of state fragility. This article…
-
CfP: 2025 Háskóli Íslands Student Conference on the Medieval North
The Háskóli Íslands Student Conference on the Medieval North is an interdisciplinary forum for postgraduate students (masters and doctoral level) and early career researchers working in the broad field of medieval northern studies, held every April in Reykjavík, Iceland. Students who have not given…
-
Mark WestmorelandSocial & Behavioural Sciences
-
Igor BoogSocial & Behavioural Sciences
-
Mohamed MuseFaculty of Governance and Global Affairs
-
Anoma van der VeereFaculty of Humanities
-
'Terrorism and cyber criminality call for better international cooperation'
The United States and the European Union need to work together more closely in the field of the law to fight terrorists and criminals who are operating increasingly internationally. This was the advice given by American Minister of Justice Loretta Lynch during her visit to Leiden University on 1 Jun…
-
ECSL Summer Course on Space, Cyber and Telecommunications Law
One of ECSL’s most successful activities is the ECSL Summer Course on Space Law and Policy, which is open to students of all levels of study, as well as a few young professionals already working in the space or space-related sectors. The course is now in its 31st year and boasts a large family of alumni…
-
Marianne Maeckelbergh
Social & Behavioural Sciences
-
Nikki MulderSocial & Behavioural Sciences
-
Exhibition North Sea Crossings (3/12/21-18/04/22, Oxford)
North Sea Crossings, a new exhibition at the Bodleian Libraries, will trace the long history of Anglo-Dutch relations. Focusing on the period from the Norman Conquest in 1066 to the Glorious Revolution of 1688, items from the Bodleian Libraries’ collections will illustrate the ways in which these exchanges…
-
Between the Wheat & the Waves: a mid-late Anglo-Saxon Settlement in a coastal setting
By comparing the archaeological evidence at Sedgeford and other sites located on both English and Continental coastal zones, what evidence is there for a shared maritime culture between these North Sea communities? Also if evidence is found, can we reveal to some extent a separate coastal identity to…
-
Dutch involvement in labour exploitation in North Korea, China and Pakistan
Clothes by big Western brands that are on sale in Dutch shops are sometimes made by North Korean workers. The Dutch state is co-financer of a motorway that is being built in Pakistan by exploited workers. These are the conclusions of a report published by the LeidenAsiaCentre on 2 April.
-
Habsburg family pulled strings to bring raiders of English North Cape expedition to justice
Richard Chancellor, the English Willem Barentsz, discovered the North Cape during the first English expedition to attempt to find a northeast passage. But the ship, the Edward Bonaventure, was ‘robbed by Flemings on its return in 1554.’ Historian Louis Sicking and legal expert Remco van Rhee found the…
-
Living on the Other Side: A Multidisciplinary Analysis of Migration and Family Law in Morocco
What are the rights of migrants in Morocco and how do this receiving state and migrants deal with them in practice?
-
The writing culture of ancient Dadan; a description and quantitative analysis of linguistics variation
Fokelien Kootstra defended her thesis on 23 April 2019
-
Slabbekoorn receives NWA grant to study fish around wind farms in the North Sea
The Dutch Research Council (NWO) awarded behavioural biologist Hans Slabbekoorn (Institute of Biology Leiden) a grant of 750,000 euros to study fish and sounds around wind farms in the North Sea.
-
Right- and Jihadist Extremists and Terrorists in Europe and North-America, 1960s-Present
In this article, Bart Schuurman and Sarah Louise Carthy conduct further research into the understanding of the causes of terrorism by assessing differences and similarities between left-, right- and jihadist extremists and terrorists. The article draws on the Analysen zum Terrorismus, one of the most…
-
populations and human-lion conflicts in Pendjari Biosphere Reserve, North Benin
Promotores: G.R. de Snoo, B. Sinsin, Co-Promotor: H.H. de Iongh
-
The Chinese diaspora, race and US foreign policy
The project focusses on how US views of the Chinese diaspora in Southeast Asia influenced its strategic interpretations of the region. Being eleven million strong, dispersed across the region and sharing ethnic ties with Communist China, interpretations of the diaspora intersected with key Cold War…
-
Rule of law challenges and prospects in Albania and North Macedonia
On 1 October 2019, Dr. Darinka Piqani co-organized and moderated a panel discussion on the theme of “Rule of law challenges and prospects in Albania and North Macedonia”.
-
Online webinar cyber security
Study information
-
Laurie Kalb CosmoFaculty of Humanities
-
Timo McGregorFaculty of Humanities
-
Nika Kratsashvili
Social & Behavioural Sciences
-
Introductie webinar cyber security
Study information
-
Introductie webinar cyber security
Study information
-
Corianne OosterbaanFaculty of Governance and Global Affairs
-
Damian PargasFaculty of Humanities
-
Education
The Cyber Security Governance research group contributes significantly to the educational programmes at Leiden University. By integrating cutting-edge research into the classroom, we ensure that students engage with the latest developments in the field of cyber security, governance, and ethics.
-
Vulnerabilities and Cyberspace: A New Kind of Crises
In this study, Bibi van den Berg and Sanneke Kuipers from ISGA, explore the ways in which cyber-related incidents may lead to crises
-
Staff
The Cyber Security lecturers are scholars and lecturers of Leiden University, Delft University of Technology and The Hague University of Applied Sciences.
-
Contact
Still have questions about the Cyber Security programme? Please contact us!
-
Introductie webinar cyber security
Study information
-
For professionals
The faculty offers several options to deepen and develop your knowledge while being employed. Within the faculty's themes, or in your own working field as a dual PhD candidate, you will be guided to make a next step in your career.
-
Was the Netherlands a key player in the massive Sky ECC hack’?
A new document casts doubt on the Dutch Public Prosecution Service’s role in the large-scale Sky ECC encryption bust, previously attributed to France. Bart Schermer, Professor of Law and Digital Technology, commented in ‘de Volkskrant’ newspaper.
-
Responsible Behaviour in Cyberspace: Global narratives and practice
This edited volume draws from papers presented at the conference Closing the Gap | Responsibility in Cyberspace: Narratives and Practice, organized in June 2022 at the Egmont Palace in Brussels, Belgium, by Leiden University, as part of the EU Cyber Direct project.
-
Systems and Security
Researchers at LIACS are working to devise the computers of tomorrow that will be the backbone of the Cloud and Edge computing paradigms as well as the Internet of Things. In this respect, we are involved in research and development of high performance computing systems, embedded & real-time computing…
-
Henning LahmannFaculty of Law
-
The king is dead. Long live the king?
Kim Jong Il, leader of North Korea, is dead. His youngest son Kim Jong Eun is expected to be his successor. Remco Breuker, Leiden Professor of Korea Studies, gives a profile of the new leader.
-
Lise AndersenFaculty of Governance and Global Affairs
-
Letty ten HarkelFaculty of Archaeology
-
Governing Cyberspace: Behavior, Power and Diplomacy
Governing Cyberspace: Behavior, Power and Diplomacy is based on a selection of papers presented during The Hague Program for Cyber Norms' inaugural conference Novel Horizons: Responsible Behaviour in Cyberspace from 5-7 November 2018 in The Hague. The volume is edited by Dennis Broeders and Bibi van…
-
Education
The Institute of Security and Global Affairs (ISGA) offers courses at both bachelor’s and master’s level. There are also minors, online learning and courses for professionals.
-
Cristina del Real
Don’t wait until you’ve been hacked: how we should prepare for cybercriminals
- About this minor
-
Restraint under conditions of uncertainty: Why the United States tolerates cyberattacks
This new article by Monica Kaminska is part of a special issue for Journal of Cybersecurity, based on a selection of contributions from THe Hague Program for Cyber Norms' 2019 Conference.
-
Systems and security
Researchers at LIACS are working to devise the computers of tomorrow that will be the backbone of the Cloud and Edge computing paradigms as well as the Internet of Things. In this respect, we are involved in research and development of high performance computing systems, embedded & real-time computing…