Curricula - Knowledge - Navigation
Browsing Category

Categories

Social media crime: Clusters for a structural analysis

Ever since their coming into existence, social media have been impacting our communication behaviour and added new possibilities to it. Despite their numerous advantages, they are also increasingly becoming a breeding ground for criminal activity. In order to enhance law enforcement in that respect, a structured approach is required. In a legal perspective the term

Cyber-warfare – How the battlefield went digital

Spies and intelligence agents, wiretaps and classified documents; thanks to our extensive training through Hollywood movies, these things seem to us purely cinematic, the elements of a more or less intriguing political thriller. But things like that really do exist. It’s not unheard of that countries spy on, manipulate or sabotage each other to reach

Cyberbullying: An aid and prevention plan

School life is not always easy and all harmonious, in fact harassment and bullying pose a continuous problem. Communication technology and constantly new trending social media channels add further dimensions to the phenomenon, so that cyberbullying presents an even more complex matter. In order to protect children and teenagers the matter has to be tackled

General matters of the Horizon 2020 programme

Aside from more specific projects and calls, the European Commission’s Horizon 2020 Work Programme also deals with the fundamental structures in the field of security research and communication. To ensure the best possible outcomes for research and innovation in the European Union, the areas of research communication, frameworks and procurement needs to be improved continuously.

Technological challenges for managing border security

When it comes to border security, conventional means seem to be unable to counter modern challenges on a large scale. A new approach is vital to address this issue more adequately. One of the main challenges is for example the management of goods and persons at the borders. Could the implementation of technology be the

Cybersecurity, Digital Privacy and data protection

As computers gain hold of nearly every facet of our lives, our reliance on them grows. Even now, the water supply, traffic light systems and supply chains of whole communities and cities rely strongly on the correct functioning of computer systems. Should these be infiltrated or manipulated, the consequences could be costly as well as