This open access book responds to the urgent need to improve how we prevent and resolve conflict. It introduces Adaptive Peacebuilding through evidence-based research from eight case studies across Africa, Asia, the Middle East, and Latin America. It also considers how China and Japan view and practice peacebuilding. The book focuses on how peacebuilders design, implement and evaluate programs …
It is a well-known fact both among scholars of propaganda and disinformation, and among political leaders that Sputnik and RT are using their news coverage for disinformation purposes to harm Western and European societies. Following the Russian invasion of Ukraine, which enhanced the security threat by disinformation, the EU decided to ban these two media. Against this backdrop, the study asks…
This is a chapter from The Criminal Act: The Role and Influence of Routine Activity Theory edited by Martin A. Andresen and Graham Farrell. This chapter is available open access under a CC BY license. Target suitability is a cornerstone of Marcus Felson's routine activities approach, and critical in determining crime rates. Recent research identifies reduced target suitability, via improved sec…
This open access book constitutes the proceedings of the 8th International Conference on Principles of Security and Trust, POST 2019, which took place in Prague, Czech Republic, in April 2019, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2019. The 10 papers presented in this volume were carefully reviewed and selected from 27 submissions. They deal…
Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author’s experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies and provides guidance for a management-level audience. Managing Risk and Information Security provides thoug…
This open access book presents a nuanced and accessible synthesis of the relationship between land tenure security and sustainable development. Contributing authors have collectively worked for decades on land tenure as connected with conservation and development across all major regions of the globe. The first section of this volume is intended as a standalone primer on land tenure security an…
In diesem Open-Access-Buch werden Erfahrungen zur Zusammenarbeit und zum Wissensmanagement verschiedenster staatlicher, gemeinnütziger und privater Akteure in der Flüchtlingslage 2015/16 aufbereitet, mit praxisnahen Beispielen angereichert und um Übungen zur Vorbereitung auf zukünftige Lagen ergänzt. Die damalige Lage stellte die Beteiligten vor große Herausforderungen, sowohl im Hinblick…
This open access book examines Russia-China relations across a variety of civilian and military areas of cooperation. Leading experts in the field present empirical case studies covering a wide range of strategic cooperation areas between Russia and China, such as technological, military, economic and political cooperation. The contributing authors shed new light on Chinese and Russian strategi…
This open access book summarizes knowledge about several file systems and file formats commonly used in mobile devices. In addition to the fundamental description of the formats, there are hints about the forensic value of possible artefacts, along with an outline of tools that can decode the relevant data. The book is organized into two distinct parts: Part I describes several differen…