This open access book features various studies on democratization, transformation, political and economic development, and security issues in the Organization for Security and Cooperation in Europe (OSCE) geographical region and beyond. Written by experts and academics in the fields of human rights, security, transformation and development, particularly in post-soviet and communist countries, i…
This open-access book explores the security dynamics amid the polarization, shifting borders, and liquid governance that define the Zeitenwende era in Europe's eastern neighbourhood and Central Asia. Presenting various case studies, the volume unveils the intricate web of border dynamics and practices, including the nuanced interplay of border disputes within the Organization for Security and C…
This open access book examines Russia-China relations across a variety of civilian and military areas of cooperation. Leading experts in the field present empirical case studies covering a wide range of strategic cooperation areas between Russia and China, such as technological, military, economic and political cooperation. The contributing authors shed new light on Chinese and Russian strategi…
This book explores the contours of the code of silence and provides policy recommendations geared toward creating an environment less conducive for police misconduct. It responds to the recent calls for police reform, in the wake of the perceived illegitimacy of police actions and the protection that the code of silence seems to provide to the police officers who violate the official rules. …
Dieses Open-Access-Buch setzt sich zum Ziel, eingebettet in historische Kontexte paralleler Kalter Kriege im globalen und regionalen Rahmen die historische Genese der amerikanisch-iranischen Sonderbeziehungen nach dem Zweiten Weltkrieg und deren Transformation in den drei anschließenden Jahrzehnten zu analysieren. In der Geschichte der Staatenwelt nach dem Zweiten Weltkrieg gibt es wohl kaum e…
This open access book offers an analysis of why preparations for digital disruption should become a stated goal of security policy and policies that aim to safeguard the continuity of critical infrastructure. The increasing use of digital technology implies new and significant vulnerabilities for our society. However, it is striking that almost all cyber-security measures taken by governments, …
This open access book follows the idea that security policy must be based on strategic analysis. Defence policy and the role of the armed forces can subsequently be determined on the grounds of said analysis. More than ever, internal and external security, and developments both in the Netherlands and abroad are interconnected. The world order is shifting, the cooperation within NATO and the EU …
This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware …
This open access book constitutes the refereed proceedings of the 15th International Annual Conference on Cyber Security, CNCERT 2018, held in Beijing, China, in August 2018. The 14 full papers presented were carefully reviewed and selected from 53 submissions. The papers cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat intelligence …
This open access book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, held in London, UK, in February 2018. The 12 full papers presented together with an overview paper were carefully reviewed and selected from 31 submissions. Security of distributed interconnected systems, software systems, and the Internet of Th…