416 zoekresultaten voor “cyber bullying” in de Publieke website
-
The Negative Effects of Bullying
-
-
Involvement in Bullying and Personality
-
-
5 questions about bullying
From sleep problems to suicide attempts: the consequences of bullying can be very serious. The National Day against Bullying (in the Netherlands 19 April) is the opportunity for Leiden psychologist Mitch van Geel to share some recent insights from his research.
-
Bullying in India; the teachers’ role
-
-
Combating Bullying in Schools by Means of Self-Affirmation Training
-
-
The Hague Program for Cyber Norms
A research program that focuses on the development and implementation of cyber norms.
-
Simone van der Hof
Faculteit Rechtsgeleerdheid
-
Cyber Security by Integrated Design (C-SIDe)
C-SIDe project involves a broad selection of associates in solving cybersecurity problems. Security of software systems has emerged as a critical need in our interconnected society. Companies developing software products look for Security-by-Design approaches accommodating security into their software…
-
EU Cyber Diplomacy Initiative (EU Cyber Direct)
EU Cyber Direct – EU Cyber Diplomacy Initiative supports the European Union’s cyber diplomacy and international digital engagements in order to strengthen rules-based order in cyberspace and build cyber resilient societies. To that aim, we conduct research, support capacity building in partner countries,…
-
Let Them Roar: Small States as Cyber Norm Entrepreneurs
A discourse on international cyber norms has emerged ever since the United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security (UN GGE) recommended eleven norms on responsible state behaviour in cyberspace.
-
Cyber Security
Researchers at LIACS are working to devise the computers of tomorrow that will be the backbone of the Cloud and Edge computing paradigms as well as the Internet of Things. In this respect, we are involved in research and development of high performance computing systems, embedded & real-time computing…
-
Cyber security
To make digital communication more secure, we need to tighten up the legal frameworks and identify the biggest cyber threats.
-
Sixth edition of the European Cyber Security Perspectives
On 12 March 2019, KPN published the sixth edition of the European Cyber Security Perspectives. Sergei Boeke, researcher at the Institute of Security and Global Affairs, has written an article about Cyber Warfare.
-
The Demilitarisation of Cyber Conflict
The debate about state behaviour in cyberspace may be set in the wrong legal key.
-
Cyber Security Governance
The research group Cyber Security Governance will provide cutting-edge academic research in the domain of cyber, where modern technology interacts with traditional concepts such as governance, sovereignty, law-enforcement, international relations and conflict.
-
Cyber Security (MSc)
The executive master’s programme in Cyber Security of Leiden University takes a multidisciplinary approach that helps you develop effective and sustainable solutions for cyber risks and threats.
-
The Social Cognitions of Victims of Bullying: A Systematic Review
Sanne Kellij and colleagues systematically reviewed 142 articles, examining evidence for three hypotheses on the relation between victimization and social information processing.
-
Cyber Operations and International Law
This book offers a comprehensive analysis of the international law applicable to cyber operations, including a systematic examination of attribution, lawfulness and remedies. It demonstrates the importance of countermeasures as a form of remedies and also shows the limits of international law, highlighting…
-
Private active cyber defense and (international) cyber security—pushing the line?
This article on private active cyber defense by Dennis Broeders is part of a special issue of the Journal of Cybersecurity, based on a selection of contributions taken from the 2019 Conference on Cyber Norms organized by The Hague Program for Cyber Norms.
-
Revisiting past cyber operations in light of new cyber norms and interpretations of international law: inching towards lines in the sand?
This article traces the evolution of interpretations of international law and international cyber norms on responsible state behaviour in cyberspace by reassessing five major – and allegedly state-led – cyber operations: Stuxnet 2010; Belgacom 2013-2014, the Ukrainian power grid 2015, the US presidential…
-
The Hague Program on International Cyber Security
Taking the changing landscape of international cyber security and cyber conflict as a point of departure, The Hague Program on International Cyber Security focuses on the various modes of governance that states and other actors can bring into play to deal with and shape the strategic changes and challenges…
-
Cyber agent technology and intelligence agencies
Cyber agent technology and intelligence agencies is a project that is commissioned by Tracks Inspector, a Dutch company that develops innovative software.
-
Cyber-noir: Cybersecurity and popular culture
New article on popular culture influences on cybersecurity experts, available Open Access at Contemporary Security Policy, part of a special issue edited by dr. Myriam Dunn Cavelty.
-
Cyber Governance and National Security: Intervening in Ungoverned Spaces
The Netherlands Ministry of Defense and Ministry of Security and Justice have requested the Centre for Terrorism and Counterterrorism to complete a research project on cyber governance from a policy perspective. The results of this project will contribute to the deliverables of the fourth International…
-
Is the Gulf Cooperation Council (GCC) Cyber Resilient?
James Shires, Assistant Professor at the Institute of Security and Global Affairs at Leiden University, co-authored this report on the GCC's cyber resilience with Joyce Hakmeh, Senior Research Fellow of Chatham House's International Security Programme.
-
2022 Conference on International Cyber Security: Navigating Narratives in Cyberspace
Congres/symposium
-
Boys with autism respond more angrily to bullying
Boys who are bullied develop more fear and shame; boys who bully develop more anger and less guilt, which makes it easier to justify more bullying. Boys with autism respond more angrily to bullying than others, and thus make for an easier target. Developmental psychologist Carolien Rieffe and her colleagues…
-
ISGA gains major European cyber project: EU Cyber Direct
Dennis Broeders, professor of global security and technology at ISGA (Institute of Security and Global Affairs), together with two partners, has been granted a major European project: EU Cyber Direct. Together with EU ISS and Carnegie Europe, ISGA forms a new consortium for 3 years with a total budget…
-
Israel: cyber securitization as national trademark & Palestinian territory occupied: cybersecurity at reduced sovereignty
Fabio Cristiano contributed two chapters to the Routledge Companion to Global Cyber-Security Strategy, edited by Scott N. Romaniuk and Mary Manjikian.
-
No Shortcuts: Why States Struggle to Develop a Military Cyber-Force
Lezing
-
Too Close for Comfort: Cyber Terrorism and Information Security across National Policies and International Diplomacy
In this article for Studies in Conflict & Terrorism, the authors analyse the evolution and interplay of national policies and international diplomacy on cyber terrorism within and across the UNSC’s permanent five members and the UN process on cyber norms (GGE and OEWG).
-
Assistant Professor with expertise on Cybersecurity Emergency Response and Cyber Crisis Management
Governance and Global Affairs, Institute of Security and Global Affairs
-
Post-doctoral researcher The Hague Program on International Cyber Security (1,0 FTE)
Governance and Global Affairs, Institute of Security and Global Affairs
-
Assistant professor Governance of Crisis, with an interest in cyber security (1.0 fte)
Governance and Global Affairs, Institute of Security and Global Affairs
-
Toward an Aesthetics by Algorithms—Palestinian Cyber and Digital Spaces at the Threshold of (In)visibility
Chapter by Fabio Cristiano and Emilio Distretti for the volume The Aesthetics and Politics of the Online Self, edited by Donatella Della Ratta, Geert Lovink, Teresa Numerico, and Peter Sarram for Palgrave Macmillan.
-
Alumni Cyber Security Academy in AD "Cyber security is hot, and not only among nerds"
Cyber security is only for socially awkward nerds? Three alumni of the Cyber Security Academy prove the opposite.
-
New interactive book helps motivate young people and tackle bullying
How do you deal with bullying? How can you motivate young people? At the NeurolabNL symposium a multidisciplinary research team launched an interactive book for teachers and youth workers. This digital book offers the latest insights and plenty of useful tips and advice. Children’s Ombudsman Margrite…
-
Limiting Viral Spread: Automated Cyber Operations and the Principles of Distinction and Discrimination in the Grey Zone
Monica Kaminska, Dennis Broeders and Fabio Cristiano have contributed a chapter to the proceedings of the 13th International Conference on Cyber Conflict (CyCon 2021), which gathers 20 articles from the law, technology and strategy domains.
-
Countering cyber terrorism in a time of 'war on words': Kryptonite for the protection of digital rights?
This collection includes six short policy-focused contributions exploring how legislation and policy on counter cyber terrorism unfold at the national level in the United States, the United Kingdom, China, Russia, France, and at the regional level of the European Union.
-
Call for papers: The Hague Program for Cyber Norms Conference
This year The Hague Program for Cyber Norms organises the first conference of an annual series to encourage academic diversity in the study of cyber security. The theme is Responsible Behavior in Cyberspace. The conference will take place in The Hague from 5 to 7 November 2018. Deadline submission of…
-
Cyber Security Governance Essentials
The new 'Cyber Security Governance Essentials' will start in September 2020. Third year bachelor students of The Leiden Institute of Advanced Computer Science (LIACS) and of the BSc Security Studies of the Institute of Security and Global Affairs (ISGA) who would like to deepen their knowledge and…
-
Cyber Security Governance Essentials
The new minor 'Cyber Security Governance Essentials' will start in September 2021. Third year bachelor students of The Leiden Institute of Advanced Computer Science (LIACS) and of the BSc Security Studies of the Institute of Security and Global Affairs (ISGA) who would like to deepen their knowledge…
-
Cyber offenders: Unique profile, unique approach?
Our society can no longer not imagine the threat of cybercrime. Banks, companies, and schools are hacked, or 'DDoSed', with increasing regularity and data is being stolen or taken hostage. To respond adequately to this threat, we need more knowledge of the perpetrators.
-
Start fourth cohort executive Master’s programme Cyber Security
Cyber Security challenges are dominating the international agendas. Therefore, the Cyber Security Academy (CSA) enthusiastically and proudly announces that on Thursday 18th January a fourth group of 26 professionals from a variety of public and private organisations will start the executive Master’s…
-
International Cyber Security Summer School 19 – 24 Augustus 2018
From 19 to 24 August 2018, the fourth edition of the International Cyber Security Summer School, will take place. During this six-day long event, you will follow lectures, work on challenging group assignments provided by different organisations, hear insiders’ perspectives, do some fun social activities…
-
Graduation Ceremony Interdisciplinary Master Cyber Security
On Thursday 7 February 2019, the graduation ceremony for the executive master programme Cyber Security took place at The Hague Security Delta (HSD). The Cyber Security programme is a collaboration of University Leiden, Delft University of Technology, and The Hague University of Applied Sciences. A total…
-
Voluntary, Non-Binding Norms for Responsible State Behaviour in the Use of Information and Communications Technology: A Commentary
The United Nations Office for Disarmament Affairs (UNODA) has published the 2017 issue in their Civil Society and Disarmament series, titled Voluntary, Non-Binding Norms for Responsible State Behaviour in the Use of Information and Communications Technology: A Commentary. The series aims to provide…
-
Ilina Georgieva
Faculteit Governance and Global Affairs
-
Mitch van Geel
Faculteit der Sociale Wetenschappen
-
The unexpected norm-setters: Intelligence agencies in cyberspace
Ilina Georgieva published an article in the journal Contemporary Security Policy on the norm-setting role of intelligence agencies.