17 February | Seminar | International Law As We Know It, with Lianne Boer
On Thursday 17 February, we will host the second seminar in our new monthly seminar series. Lianne Boer, Assistant Professor of Public International Law at Vrije Universiteit Amsterdam will present her new book International Law As We Know It.
We will hold this seminar online on Zoom. Register here for the seminar...
|
|
23 February | Roundtable on Cybersecurity and the Politics of Knowledge Production
How can we produce diverse and relevant knowledge in and about cybersecurity? Join us and speakers Tim Stevens, Julia Slupska, Louise Marie Hurel, Myriam Dunn Cavelty, Dennis Broeders, Tobias Liebetrau and James Shires for this online roundtable on issues such as temporality, gender and intersectionality, expertise, policy, diplomatic, military, intelligence and other academic encounters. Register here for this roundtable...
|
|
24 March | Bitskrieg: The New Challenge of Cyberwarfare, with John Arquilla
In our March seminar, we welcome John Arquilla, Distinguished Professor of Defense Analysis at the United States Naval Postgraduate School, for a talk on his book Bitskrieg: The New Challenge of Cyberwarfare.
This seminar will be held on online via Zoom. You can register here to join us.
|
|
Toward an Aesthetics by Algorithms—Palestinian Cyber and Digital Spaces at the Threshold of (In)visibility
New publication by our postdoctoral researcher Fabio Cristiano and Emilio Distretti for the volume The Aesthetics and Politics of the Online Self. This chapter explores how algorithms produce aesthetic forms and dystopian configurations across Palestinian cyber and digital spaces. Continue reading...
|
|
20 June | Hague Threat Intelligence Exchange (Hague TIX)
On 20 June, The Hague Threat Intelligence Exchange (Hague TIX) will bring together Europe’s leading threat intelligence researchers for a day of talks on disruptive and destructive cyber operations.
The purpose of the conference is to explore the landscape of cyber threats and foster collaboration between private sector threat intelligence, government, and academia. If you are a threat intelligence researcher and would like to speak at the conference, please send a proposed title and abstract of your talk to haguetix@thehagueprogram.nl. We will contact applicants with the outcome by 31 March 2022.
|
|
Interview with Dennis Broeders: "Looking for the elephant in the room"
In this article on the Leiden University website, Dennis Broeders, Professor of Global Security and Technology and Senior Fellow of our Program, talks about our plans and focus: "Through our research and activities we hope to create understanding of what actually is cyber conflict. Our starting point is the changing landscape of international cyber security and cyber conflicts." Continue reading...
|
|
Join us on LinkedIn!
We recently joined LinkedIn, and you can follow us for updates here.
|
|
Latest entries in our International Cyber Security Bibliography
- Zegart, A.B. (2022). Spies, Lies, and Algorithms: The History and Future of American Intelligence, Princeton University Press.
- Egloff, F.J. (2022). Semi-State Actors in Cybersecurity, Oxford University Press.
- Dunn Cavelty, M. & Wenger, A. (eds). (2022). Cyber Security Politics: Socio-Technical Transformations and Political Fragmentation, Routledge.
- Shires, J. (2021). The Politics of Cybersecurity in the Middle East, Hurst.
- Mačák, K. (2021). “Unblurring the lines: military cyber operations and international law”, Journal of Cyber Policy, 6 (3).
- Kulikova, A. (2021). “Cyber norms: technical extensions and technological challenges”, Journal of Cyber Policy, 6 (3).
- Kania, E.B. (2021). “China’s quest for quantum advantage—Strategic and defense innovation at a new frontier”, Journal of Strategic Studies, 44 (3): 922-952.
- Fouad, N. (2021). “The non-anthropocentric informational agents: Codes, software, and the logic of emergence in cybersecurity”, Review of International Studies, 1-20.
- Flonk, D. (2021). “Emerging illiberal norms: Russia and China as promoters of internet content control”, International Affairs, 97 (6): 1925-1944.
- Burton, J. & Christou, G. (2021). “Bridging the gap between cyberwar and cyberpeace”, International Affairs, 97 (6): 1727-1747.
- Baker-Beall, C. & Mott, G. (2021). “Understanding the European Union’s Perception of the Threat of Cyberterrorism: A Discursive Analysis", Journal of Common Market Studies.
Complete bibliography found here. Please send any additions or suggestions to info@thehagueprogram.nl.
|
|
Our publication series
|
Vériter, S.L., M. Kaminska, D. Broeders & J. Koops (eds.) (2021). Responding to the COVID-19 'infodemic': National countermeasures against information influence in Europe. |
|
Cristiano, F., D. Broeders and D. Weggemans (eds.) (2020). Countering cyber terrorism in a time of ‘war on words’: Kryptonite for the protection of digital rights? |
|
Broeders, D., E. De Busser and P. Pawlak. (2020). Three tales of attribution in cyberspace: Criminal law, international law and policy debates |
|
Roguski, P. (2020). Application of International Law to Cyber Operations: A Comparative Analysis of States' Views |
|
Broeders, D., L. Adamson and R. Creemers. (2019). Coalition of the unwilling? Chinese and Russian perspectives on cyberspace |
|
Broeders, D., S. Boeke and I. Georgieva. (2019). Foreign intelligence in the digital age. Navigating a state of 'unpeace' |
|
|
|
|
|