The growth and health of our digital economies and societies depend on the core protocols and infrastructure of the Internet. This technical and logical substructure of our digital existence is now in need of protection against unwarranted interference in order to sustain the growth and the integrity of the global Internet. The Internet's key protocols and infrastructure can be considered a glo…
This is the first volume to offer an in-depth look at (lethal) violence in the Balkans. The Balkans Homicide Study analyses 3,000 (attempted) homicide cases from Croatia, Hungary, Kosovo, Macedonia, Romania and Slovenia. Shedding light on a region long neglected in terms of empirical violence research, the study at hand asks: - What types of homicides occur in the Balkans? - Who are the perpe…
Violence against women is characterised by its universality, the multiplicity of its forms, and the intersectionality of diverse kinds of discrimination against women. Great emphasis in legal analysis has been placed on sex-based discrimination; however, in investigations of violence, one aspect has been overlooked: violence may severely affect women's health and access to reproductive health, …
Crimea merupakan suatu daerah otonom yang mempunyai parlemen sendiri, namun secara fisik dan politik tetap masuk ke dalam wilayah kedaulatan Ukraina. Dalam hal ini, status Crimea masih merupakan bagian dari wilayah kedaulatan Ukraina. Padahal, mayoritas rakyat Crimea lebih memilih untuk bergabung dengan Rusia. Permasalahan timbul ketika terjadi krisis politik internal di Ukraina. Krisis ini dip…
How does terrorism affect our picture of the history of terrorism then, if the victims are moved centre stage? If the focus is put on their suffering? The contributions to this edition of the European History Yearbook will examine such questions in a broad range of historical case studies and methods, including visual history.
This is a chapter from The Criminal Act: The Role and Influence of Routine Activity Theory edited by Martin A. Andresen and Graham Farrell. This chapter is available open access under a CC BY license. Target suitability is a cornerstone of Marcus Felson's routine activities approach, and critical in determining crime rates. Recent research identifies reduced target suitability, via improved sec…
This open access book explores the legal aspects of cybersecurity in Poland. The authors are not limited to the framework created by the NCSA (National Cybersecurity System Act – this act was the first attempt to create a legal regulation of cybersecurity and, in addition, has implemented the provisions of the NIS Directive) but may discuss a number of other issues. The book presents internat…
This book is about the ways in which the governance of illicit drug use shapes female users’ lives. It examines how women drug users’ subjectivities, and hence their experiences, are shaped and regulated by drug policies. The construction of female users’ subjectivities in policy discourse and the impact the characteristics ascribed to them has on these women’s experiences are expl…
Coffeeshops are the most famous example of Dutch tolerance. But in fact, these cannabis distributors are highly regulated. Coffeeshops are permitted to break the law, but not the rules. On the premises, there cannot be minors, hard drugs or more than 500 grams. Nor can a coffeeshop advertise, cause nuisance or sell over five grams to a person in a day. These rules are enforced by surprise polic…