RSS

Security

  • COE dataprotection

    International Data Privacy Day 2018

    January 25, 2018

    People’s personal data are being processed every second; at work, in their relations with public authorities, in the health field, when they buy goods or services, travel or surf the Internet. Individuals are generally unfamiliar with the risks related to the protection of their personal data and of their rights in this respect. “Respecting Privacy, Safeguarding Data and Enabling Trust” is the theme for Data Privacy Day 2018, an international effort held annually on January 28 to create awareness about the importance of privacy and protecting personal information. We have created a bibliographic overview on this topic intended as a starting point for research. It provides materials available in the Peace Palace Library catalogue, both in print and electronic format.

    Read more
  • Internet governance 2012: Who should control the Internet?

    June 1, 2012

    In the last twenty years, the Internet has had a tremendous impact on society and the term “Internet governance” was introduced. At first it was mainly used to describe the technical management of the Internet such as domain names and internet protocols. Nowadays governance refers to questions like “Do we all accept our responsibilities to safeguard the continued development of the Internet as a global, open and safe virtual environment? and Who sets the rules? In this blog I will give a few highlights of the current developments of internet governance on an International and (as well as on) an European level.

    Read more
  • Cyberwar: From Fiction to Fact

    Cyberwar: From Fiction to Fact

    November 27, 2009

    Computers rather than missiles could pose the biggest security threat of the future with nations able to cripple rivals by using cyberwarfare. Computer strikes could damage a country’s infrastructure as well as defence equipment, cutting off communications, power supplies and military command systems. Major interference on a large scale can be generated by computer viruses. A computer hacker can launch an attack by infiltrating databases and destroying critical data in any industry, company or government organization. Imagine the devastation of a deliberate power outage or shortage in the water supply. We’ve seen the dire results when this occurs because of a natural disaster. Such conflict has the ability to completely incapacitate an economy. The use of computers and internet in conducting warfare in cyberspace, is becoming increasingly more sophisticated.

    Read more