This open access book constitutes the thoroughly refereed proceedings of the Second International Symposium on Computer and Information Sciences, EuroCybersec 2021, held in Nice, France, in October 2021. The 9 papers presented together with 1 invited paper were carefully reviewed and selected from 21 submissions. The papers focus on topics of security of distributed interconnected systems, sof…
This open access book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, held in Beijing, China, in AJuly 2021. The 14 papers presented were carefully reviewed and selected from 51 submissions. The papers are organized according to the following topical sections: data security; privacy protection; anomaly detection; traffic an…
This open access book explores how UN peace operations are adapting to four transformational trends in the changing global order: (1) the rebalancing of relations between states of the global North and the global South; (2) the rise of regional organisations as providers of peace; (3) the rise of violent extremism and fundamentalist non-state actors; and (4) increasing demands from non-state ac…
This open access book responds to the urgent need to improve how we prevent and resolve conflict. It introduces Adaptive Peacebuilding through evidence-based research from eight case studies across Africa, Asia, the Middle East, and Latin America. It also considers how China and Japan view and practice peacebuilding. The book focuses on how peacebuilders design, implement and evaluate programs …
It is a well-known fact both among scholars of propaganda and disinformation, and among political leaders that Sputnik and RT are using their news coverage for disinformation purposes to harm Western and European societies. Following the Russian invasion of Ukraine, which enhanced the security threat by disinformation, the EU decided to ban these two media. Against this backdrop, the study asks…
This is a chapter from The Criminal Act: The Role and Influence of Routine Activity Theory edited by Martin A. Andresen and Graham Farrell. This chapter is available open access under a CC BY license. Target suitability is a cornerstone of Marcus Felson's routine activities approach, and critical in determining crime rates. Recent research identifies reduced target suitability, via improved sec…
This open access book constitutes the proceedings of the 8th International Conference on Principles of Security and Trust, POST 2019, which took place in Prague, Czech Republic, in April 2019, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2019. The 10 papers presented in this volume were carefully reviewed and selected from 27 submissions. They deal…
Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author’s experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies and provides guidance for a management-level audience. Managing Risk and Information Security provides thoug…
This open access book presents a nuanced and accessible synthesis of the relationship between land tenure security and sustainable development. Contributing authors have collectively worked for decades on land tenure as connected with conservation and development across all major regions of the globe. The first section of this volume is intended as a standalone primer on land tenure security an…
In diesem Open-Access-Buch werden Erfahrungen zur Zusammenarbeit und zum Wissensmanagement verschiedenster staatlicher, gemeinnütziger und privater Akteure in der Flüchtlingslage 2015/16 aufbereitet, mit praxisnahen Beispielen angereichert und um Übungen zur Vorbereitung auf zukünftige Lagen ergänzt. Die damalige Lage stellte die Beteiligten vor große Herausforderungen, sowohl im Hinblick…