This open access book will contribute to a more nuanced debate around seed system resilience that goes beyond the dominant dichotomous conceptualization of seed governance often characterized as traditional vs modern, subsistence vs commercial, or local vs global. While reflecting on the expanding oligopoly in the current seed system, the authors argue that such classifications limit our abilit…
This book is generally focused on food choice and which factors are associated with the decisions that define people’s eating behaviour. These factor are highly variable and include influences from the surrounding environment as well as the individual characteristics of each person. The book includes a number of chapters that address these issues from different points of view. Some explore th…
Drawing on the ethnographic experience of the contributors, this volume explores the Cultural Models of Nature found in a range of food-producing communities located in climate-change affected areas. These Cultural Models represent specific organizations of the etic categories underlying the concept of Nature (i.e. plants, animals, the physical environment, the weather, humans, and the supernat…
The damaging effects of cyberattacks to an industry like the Cooperative Connected and Automated Mobility (CCAM) can be tremendous. From the least important to the worst ones, one can mention for example the damage in the reputation of vehicle manufacturers, the increased denial of customers to adopt CCAM, the loss of working hours (having direct impact on the European GDP), material damages, i…
This is a chapter from The Criminal Act: The Role and Influence of Routine Activity Theory edited by Martin A. Andresen and Graham Farrell. This chapter is available open access under a CC BY license. Target suitability is a cornerstone of Marcus Felson's routine activities approach, and critical in determining crime rates. Recent research identifies reduced target suitability, via improved sec…
Since the end of the Cold War, a new dynamic has arisen within the international system, one that does not conform to established notions of the state’s monopoly on war. In this changing environment, the global community must decide how to respond to the challenges posed to the state by military threats, political and economic decline, and social fragmentation. This insightful work considers …
This open access book explains how PRIO, the world’s oldest peace research institute, was founded and how it survived through crises. In this book, twenty-four of its researchers and associates, including Johan Galtung, Ingrid Eide, and Mari Holmboe Ruge, who founded the institute back in 1959, tell the stories of their roles in inventing and developing peace research. They reflect on their p…
This is open access volume of the NL ARMS offers an interdisciplinary view on the domain of Compliance and Integrity in International Military Trade (CIIMT), integrating defence economics, international law, arms export control frameworks and policies, information management, organizational sciences and ethics. Although, in academia, and from an interdisciplinary perspective, CIIMT constitutes …
The North American Arctic addresses the emergence of a new security relationship within the North American North. It focuses on current and emerging security issues that confront the North American Arctic and that shape relationships between and with neighbouring states (Alaska in the US; Yukon, Northwest Territories and Nunavut in Canada; Greenland and Russia).
This open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world …