This open access book aims to consolidate and advance debates on European and global energy poverty by exploring the political and infrastructural drivers and implications of the condition across a variety of spatial scales. It highlights the need for a geographical conceptualization of the different ways in which household-level energy deprivation both influences and is contingent upon dispari…
This study reviews policy developments in recent years and, in the light of that, explores ways in which further consensus might be reached among WTO members to reduce farm trade distortions — and thereby also progress the multilateral trade reform agenda. Particular attention is given to ways that would boost well-being in developing countries, especially for those food-insecure households s…
This open access volume explores how UN peace operations are adapting to four trends in the changing global order: (1) the rebalancing of relations between states of the global North and the global South; (2) the rise of regional organisations as providers of peace; (3) the rise of violent extremism and fundamentalist non-state actors; and (4) increasing demands from non-state actors for greate…
Sebelum terjun ke bisnis online, pelaku bisnis sebaiknya mengenali dan memetakan ranah bisnis yang makin ramai ini. Selain strategi memilih model bisnis, trik marketing, dan memilih platform yang tepat, masih ada isu ancaman keamanan siber yang penting diwaspadai, baik oleh pelapak maupun pembeli. Tidak kalah penting, pelaku e-commerce perlu memahami payung hukum terkait transaksi elektronik (U…
Kompleksnya isu cybersecurity hingga keberagaman multistakeholder yang terlibat dalam cybersecurity memberikan tantangan tersendiri dalam upaya menghadapi cybersecurity. Mulai dari belum adanya definisi yang ajeg, hingga ancaman terkait cybersecurity yang mempengaruhi pembuatan kebijakan, serta upaya yang diambil untuk menghadapi ancaman-ancaman tersebut. Dilengkapi dengan studi kasus, buku ini…
This book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers? In separate chapters the book takes readers through the state of the art in fields of computer science that can shed light on these questions. In a …
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to under…
This open access book follows the idea that security policy must be based on strategic analysis. Defence policy and the role of the armed forces can subsequently be determined on the grounds of said analysis. More than ever, internal and external security, and developments both in the Netherlands and abroad are interconnected. The world order is shifting, the cooperation within NATO and the EU …
As population estimates for 2050 reach over 9 billion, issues of food security and nutrition have been dominating academic and policy debates. A total of 805 million people are undernourished worldwide and malnutrition affects nearly every country on the planet. Despite impressive productivity increases, there is growing evidence that conventional agricultural strategies fall short of eliminati…
Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will know how to prioritize your security program, and motivate and retain your team. Misalignment…
This volume contains the papers presented a t POST 2019, the 8th Conference on Principles of Security and Trust, held April 11, 2019, in Prague, Czech Republic, as part of ETAPS. Principles of Security and Trust is a broad forum related to all theoretical and foundational aspects of security and trust, and thus welcomes papers of many kinds: new theoretical results, practical applications of ex…
This book is an open access book. Many scholars have wondered if a non-Western theory of international politics founded on different premises, be it from Asia or from the “Global South,” could release international relations from the grip of a Western, “Westphalian” model. This book argues that a Buddhist approach to international relations could provide a genuine alternative. Because o…
The 2014 Referendum on Scottish independence sparked debate on every dimension of modern statehood. Levels of public interest and engagement were unprecedented, as demonstrated by record-breaking voter turnout. Yet aside from Trident, the issue of security was relatively neglected in the campaigns, and there remains a lack of literature on the topic. In this volume Andrew Neal has collated a va…
Food is fundamental to health and social participation, yet food poverty has increased in the global North. Adopting a realist ontology and taking a comparative case approach, Families and Food in Hard Times addresses the global problem of economic retrenchment and how those most affected are those with the least resources. Based on research carried out with low-income families with children ag…
This open access book brings together perspectives from multiple disciplines including psychology, law, IS, and computer science on data privacy and trust in the cloud. Cloud technology has fueled rapid, dramatic technological change, enabling a level of connectivity that has never been seen before in human history. However, this brave new world comes with problems. Several high-profile cases o…
Read Agner Fog's introductory post on our blog [...] it presents a valuable overview of the extensive literature on the societal correlates of modern warfare and makes a convincing, and timely, case for the deceptive use of the threat of war by populists or budding dictators. — Carel P. van Schaik, University of Zurich, Adaptive Behaviour (May 2018) https://doi.org/10.1177/105971231877197…
This open access book discusses the current role of smallholders in connection with food security and poverty reduction in developing countries. It addresses the opportunities they enjoy, and the constraints they face, by analysing the availability, access to and utilization of production factors. Due to the relevance of smallholder farms, enhancing their production capacities and economic and…
The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents. But with an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks. This accessible primer focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It examines emerging tren…
This open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction mod…
The aim of this open access book is to take stock of, critically engage, and celebrate feminist IR scholarship produced in Europe. Organized thematically, the volume highlights a wealth of excellent scholarship, while also focusing on the politics of location and the international political economy of feminist knowledge production. Who are some of the central feminist scholars located in Europe…
Russia, the European Union, and NATO still share some important common interests that need to be given greater attention. A return to strategic partnership is not conceivable without resolving the Ukraine confl ict, but prudent management of the antagonism in order to keep open the prospect of a peaceful new normal is crucial. At the same time, it is important to keep in mind that the persisten…
In this new Brookings Marshall Paper, Michael O’Hanlon argues that now is the time for Western nations to negotiate a new security architecture for neutral countries in eastern Europe to stabilize the region and reduce the risks of war with Russia. He believes NATO expansion has gone far enough. The core concept of this new security architecture would be one of permanent neutrality. The count…
This book provides a fresh, updated and science-based perspective on the current status and prospects of the diverse array of topics related to the potato, and was written by distinguished scientists with hands-on global experience in research aspects related to potato. The potato is the third most important global food crop in terms of consumption. Being the only vegetatively propagated specie…
This open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world …
This open access book explores the synergies and tensions between safety and security management from a variety of perspectives and by combining input from numerous disciplines. It defines the concepts of safety and security, and discusses the methodological, organizational and institutional implications that accompany approaching them as separate entities and combining them, respectively. T…
The North American Arctic addresses the emergence of a new security relationship within the North American North. It focuses on current and emerging security issues that confront the North American Arctic and that shape relationships between and with neighbouring states (Alaska in the US; Yukon, Northwest Territories and Nunavut in Canada; Greenland and Russia).
This is a chapter from The Criminal Act: The Role and Influence of Routine Activity Theory edited by Martin A. Andresen and Graham Farrell. This chapter is available open access under a CC BY license. Target suitability is a cornerstone of Marcus Felson's routine activities approach, and critical in determining crime rates. Recent research identifies reduced target suitability, via improved sec…
The damaging effects of cyberattacks to an industry like the Cooperative Connected and Automated Mobility (CCAM) can be tremendous. From the least important to the worst ones, one can mention for example the damage in the reputation of vehicle manufacturers, the increased denial of customers to adopt CCAM, the loss of working hours (having direct impact on the European GDP), material damages, i…
The damaging effects of cyberattacks to an industry like the Cooperative Connected and Automated Mobility (CCAM) can be tremendous. From the least important to the worst ones, one can mention for example the damage in the reputation of vehicle manufacturers, the increased denial of customers to adopt CCAM, the loss of working hours (having direct impact on the European GDP), material damages, i…
Drawing on the ethnographic experience of the contributors, this volume explores the Cultural Models of Nature found in a range of food-producing communities located in climate-change affected areas. These Cultural Models represent specific organizations of the etic categories underlying the concept of Nature (i.e. plants, animals, the physical environment, the weather, humans, and the supernat…
Since the end of the Cold War, a new dynamic has arisen within the international system, one that does not conform to established notions of the state’s monopoly on war. In this changing environment, the global community must decide how to respond to the challenges posed to the state by military threats, political and economic decline, and social fragmentation. This insightful work considers …
This open access book aims to educate data space designers to understand what is required to create a successful data space. It explores cutting-edge theory, technologies, methodologies, and best practices for data spaces for both industrial and personal data and provides the reader with a basis for understanding the design, deployment, and future directions of data spaces. The book captures…
This book examines new and challenging political aspects of cyber security and presents it as an issue defined by socio-technological uncertainty and political fragmentation. Structured along two broad themes and providing empirical examples for how socio-technical changes and political responses interact, the first part of the book looks at the current use of cyber space in conflictual setting…
This open access volume surveys the state of the field to examine whether a fifth wave of deterrence theory is emerging. Bringing together insights from world-leading experts from three continents, the volume identifies the most pressing strategic challenges, frames theoretical concepts, and describes new strategies. The use and utility of deterrence in today’s strategic environment is a topi…
Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in clear, straightforward language. The authors two renowned experts on computer security and law explore…