Nächste Jahreskonferenz

European Security Studies Conference 2026

Gemeinsam organisiert von der COST-Aktion NetSec, der Europäischen Initiative für Sicherheitsstudien (EISS) und der Universität Stockholm.

11. — 12. Juni 2026 Universität Stockholm, Schweden

Anmeldung geschlossen Auf Indico ansehen

Live übertragene Sitzungen

Das Rückgrat der Konferenz — Eröffnung, Runde Tische, Keynote und Abschluss — wird online übertragen. Beitritts-Links erscheinen hier, sobald sie in Indico veröffentlicht werden.

  • Eröffnung

    Introductory Remarks

    Dr Hugo Meijer (Sciences Po CERI) · Sanne Verschuren (Boston University) · Julia Carver (Leiden University) · Magnus Petersson (Stockholm University) · Magnus Petersson (Stockholm University) · Dr Hans Aldolfsson

    Stockholm University — ‘D House’, Lecture Rooms 8 and 9

    Online-Raum folgt
  • Runder Tisch

    Taking Stock of European Security in a Rapidly Changing Geopolitical Environment

    Sanne Verschuren (Boston University)

    Stockholm University — ‘D House’, Lecture Rooms 8 and 9

    Online-Raum folgt
  • Keynote

    Lieutenant General Thomas Nilsson

    Stockholm University — ‘D House’, Lecture Rooms 8 and 9

    Online-Raum folgt
  • Runder Tisch

    Navigating the Job Market

    Julia Carver (Leiden University)

    Stockholm University — ‘D House’, Lecture Rooms 8 and 9

    Online-Raum folgt
  • Abschluss

    Concluding Remarks

    Julia Carver (Leiden University) · Moritz Weiss (LMU Munich) · Magnus Petersson (Stockholm University) · Magnus Petersson (Stockholm University)

    Stockholm University — ‘D House’, Lecture Rooms 8 and 9

    Online-Raum folgt

Programm

Direkt aus Indico bezogen. Tägliche Aktualisierung — Änderungen im Vorfeld der Konferenz erscheinen hier innerhalb von ~24 Stunden.

Day 1 — 2026-06-11

  1. Registration and Coffee

  2. Introductory Remarks

    ‘D House’, Lecture Rooms 8 and 9

    Vorsitz:Dr Hugo Meijer (Sciences Po CERI), Sanne Verschuren (Boston University), Julia Carver (Leiden University), Magnus Petersson (Stockholm University), Magnus Petersson (Stockholm University), Dr Hans Aldolfsson

  3. War Abroad

    War and Peace Abroad: Security Assistance, Multilateral Operations, and Peace-Building

    ‘D House’, Lecture Rooms 8 and 9

    Vorsitz:Kersti Larsdotter (Swedish Defense University)

    Beiträge anzeigen (4)
    1. Mapping Plural Visions of Peace: The Peace Cube as an Analytical Framework

      Yijun Xu (Free University of Berlin)

      Recent debates in peacebuilding have moved beyond the liberal peace paradigm to emphasize plural, locally grounded understandings of peace. However, despite this “local turn,” the field still lacks systematic tools for conceptualizing and comparing diverse visions of peace across actors and contexts. This article addresses this gap by proposing a new… Vollständiges Abstract lesen

    2. Interpreting Counterterrorism in African Conflict Management

      Saurav Narain (Leiden University)

      Scholarly attention to the convergence between international conflict management and counterterrorism has expanded significantly, though with an implicit interpretation of the ‘use of force’ logic, and an emphasis on UN peacekeeping’s downsizing of protection and human rights norms in engagement with the concept (Moe, 2021; Geis and Moe, 2023). Furthermore,… Vollständiges Abstract lesen

    3. Socialized to Cooperate? Foreign Military Training and Coordination in UN Peacekeeping Operations

      Ilker Kalin (Stockholm University)

      United Nations peacekeeping operations (PKOs) are inherently multinational and rely on coordination among national contingents with diverse military cultures, doctrines, and rules of engagement. While existing research shows that mission composition and prior in-mission experience shape peacekeeping effectiveness, we know far less about whether coordination… Vollständiges Abstract lesen

    4. From rebels’ to State’s justice: post-conflict justice choices in 2026 Syria

      Marie Robin (Université Paris Panthéon-Assas)

      How do rebels deliver justice when they reach power? This contribution examines post-conflict justice choices in Syria following the political transition of December 2024, focusing on how the new leadership under Ahmad al-Sharaa needs to address widespread human rights violations committed during the al-Assad era. These violations include crimes perpetrated… Vollständiges Abstract lesen

    Virtually Transformed? Digital Infrastructures, Competition, and Governance

    ‘D House’, Lecture Rooms 8 and 9

    Vorsitz:Julia Carver (University of Oxford)

    Beiträge anzeigen (4)
    1. Knowing cybersecurity: The epistemic infrastructural power of big tech

      Tobias Liebetrau (University of Copenhagen)

      Big tech companies authoritatively produce data, information, and knowledge about cybersecurity threats to individuals, businesses, and states. But how do they render international cybersecurity phenomena knowable? Through which practices, means, and devices is this knowledge generated? This paper argues that examining the epistemic infrastructural power of… Vollständiges Abstract lesen

    2. Governing cybersecurity and the politics of state control in the digital age

      Moritz Weiss (LMU Munich)

      Digital technologies have become deeply entangled with the fabric of contemporary societies. Data infrastructures and cybersecurity practices underpin not only economic activity but also state authority and national security. This growing entanglement gives rise to a central question: how are states reorganizing their authority structures and cybersecurity… Vollständiges Abstract lesen

    3. A Typology of Small State Agency: Southeast Asian States in US-China Submarine Cable Competition

      Barbora Valockova (National University of Singapore) · Ms Mae Chow (National University of Singapore)

      How do small and middle powers preserve autonomy amid great-power competition in critical digital infrastructure? This paper addresses this foundational question in International Relations by examining Southeast Asian states' navigation of US-China rivalry in submarine cable governance. Drawing on semi-structured interviews and comparative case analysis of… Vollständiges Abstract lesen

    4. Do Parliaments Dream of Cyber Power? Parliamentary Scrutiny in the Strategic Domain of Cyberspace

      Mattia Sguazzini (University of Genova, Italy)

      Cybersecurity has become central to strategic competition and foreign policy, yet research has focused primarily on executive decision-making, military doctrines, and national cyber strategies, marginalising parliamentary roles in this securitised and technically complex domain. This paper examines how legislatures scrutinise cyber policy in democratic… Vollständiges Abstract lesen

  4. Lunch

  5. Gender, Politics, and Security

    ‘D House’, Lecture Rooms 8 and 9

    Vorsitz:Chiara Ruffa (Sciences Po)

    Beiträge anzeigen (4)
    1. Are Tradwives Making Social Reproduction Great Again? How Male Supremacist Women Strengthen Far-Right Extremism, Militarism and War

      Crystal Whetstone (Bilkent University)

      Non-traditional security challenges are on the rise due, in part, to a growing far-right that interlinks with cyber(in)security. This includes the phenomenon of tradwives, or so-called traditional wives, a growing global movement with origins in the west, who actively further male supremacism, militarism and other forms of violence, even as they are seen as… Vollständiges Abstract lesen

    2. No Woman's Land: Securitisation of Female Forced Migration in Afghanistan

      Jéssica da Costa Pereira (NOVA University of Lisbon - School of Social Sciences and Humanities)

      Forced migration is a phenomenon present in globalisation’s dynamics, as is the absence of women in the conceptualisation of the processes that shape the lives of citizens. At the intersection of these two realities, we aim to analyse female forced migration as a security issue, analysing the absence of gender in the definition of forced migrant by the… Vollständiges Abstract lesen

    3. Artistic Resilience-Building in Lithuania’s Local Security Policy

      Anna Luisa Reinhardt (Sciences Po, Northern German Lutheran Church, Lithuanian Diakonija)

      **Abstract** Lithuanian orphans sing patriotic songs at Šakiai Diakonija, my diaconal workplace, located just a 20-minute drive from the Russian border—and roughly 2 minutes for the medium-range missiles stationed in Kaliningrad. Recentring human security in the investigation of **children’s lives at EU borders**, this contribution offers valuable insights… Vollständiges Abstract lesen

    4. Gendering Non-Traditional Security: A Comparative Analysis of Sexual Violence, Reconciliation and Post-War Development in Bosnia-Herzegovina and Colombia

      Teodora Stoicescu (National University of Political Studies and Public Administration)

      This paper will focus on the gender-based violence during armed conflicts as a non-traditional security challenge that is affecting the post-conflict development, stability and any peacebuilding effort. The analysis will be situated within feminist studies and will focus on how post-conflict approaches towards policies, reconciliation and reparations need… Vollständiges Abstract lesen

    Nuclear Weapons in a Changing World: From Deterrence to Arms Control

    ‘D House’, Lecture Rooms 8 and 9

    Vorsitz:Sanne Verschuren (Boston University)

    Beiträge anzeigen (4)
    1. Upload Pending? Tradeoffs, Uncertainty, and Damage-Limitation in a Multipolar Age

      Tyler Bowen (United States Naval War College)

      How does China’s nuclear modernization affect U.S. nuclear strategy? What are the crisis bargaining and crisis stability implications of the emerging nuclear balance between the United States and China? How might the nuclear balance evolve over time? This paper addresses these questions. I argue that by building more hardened targets, China is imposing a… Vollständiges Abstract lesen

    2. From Precision to Existential Risk: Hypersonic Weapons and the Erosion of the Conventional–Nuclear Divide

      Mr Tahir Azad (Department of Politics & IR, University of Reading, UK)

      Recent hypersonic weapon technology advances have changed military power, challenging conventional and nuclear warfare distinctions. Hypersonic glide vehicles and cruise missiles, promoted as precision, speed, and deterrence, are compressing decision-making timelines, circumventing missile-defence architectures, and blurring strategic stability-underpinning… Vollständiges Abstract lesen

    3. Legitimating the Bomb: US Efforts to Manage Public Information about Nuclear Weapons after World War II

      Jennifer Erickson

      The horrific physical, medical, and environmental effects of nuclear weapons underpin long-standing ideas about nuclear deterrence, as well as challenges to their legitimacy and legality. Yet while US planners anticipated the bomb’s immense physical destruction in Japan 1945, they paid little attention to its probable medical and environmental effects.… Vollständiges Abstract lesen

    4. Limit to Win It: A Typology of Competitive Arms Control Practices

      Samuel Seitz (University of Oxford)

      Arms control is traditionally conceptualized as a cooperative undertaking, reducing risk and obviating the need for wasteful expenditure. But arms control can also be employed for competitive ends, shaping competition in ways that asymmetrically advantage certain parties. While previous literature has identified individual examples of competitive arms… Vollständiges Abstract lesen

  6. Coffee break

  7. The Conduct of Contemporary and Future War

    ‘D House’, Lecture Rooms 8 and 9

    Vorsitz:Giles Moon (Oxford University)

    Beiträge anzeigen (4)
    1. Learning from Ukraine: The West must be prepared for positional warfare

      Baptiste Alloui-Cros (Oxford University) · Giles Moon (Oxford University)

    2. Conceptual Inquiry into Military Deep Operations: A Framework for Analysis

      Mr Martijn Rouvroije (Netherlands Defence Academy - Faculty of Military Sciences) · Martijn Rouvroije (Netherlands Faculty of Military Sciences)

    3. Working in the Margins: Can Small State Special Operations contribute to Deterrence?

      Troels Burchall Henningsen (Royal Danish Defence University)

    The Politics of Deterrence in Europe

    Panel: The Politics of Deterrence in Europe

    ‘D House’, Lecture Rooms 8 and 9

    Vorsitz:Thomas Fraise (University of Copenhagen/Sciences Po)

    Beiträge anzeigen (4)
    1. Ritual deterrence, magic strategies, and nuclear war in Europe

      Prof. Matthew Evangelista (Cornell University)

Day 2 — 2026-06-12

  1. Cofffee Break

  2. Navigating the Job Market

    ‘D House’, Lecture Rooms 8 and 9

    Vorsitz:Julia Carver (Leiden University)

    Diskutant:innen:Chiara Libiseller (Leiden University), Chiara Ruffa (Sciences Po), Jennifer Erickson, Magnus Petersson (Stockholm University), Magnus Petersson (Stockholm University)

    Geopolitical Power Europe: A Reality Check in Western Balkans and Eastern Neighbourhood

    ‘D House’, Lecture Rooms 8 and 9

    Vorsitz:Filip Ejdus (University of Belgrade)

    Beiträge anzeigen (4)
    1. EU’s Ontological Security and Geopolitical Enlargement

      Nikolaos Tzifakis (University of the Peloponnese)

    2. Geopoliticisation of EU Enlargement in the Western Balkans and Eastern Partnership: A Role-Theoretical Perspective

      Marko Kovačević (University of Belgrade) · Milan Varda (University of Belgrade) · Dr Tijana Rečević Krstić (University of Belgrade)

    3. From Normalisation to Strategic Stabilisation: Geopolitisation of the Pristina–Belgrade Dialogue within EU Enlargement

      Alexandra Prodromidou ((York Europe Campus, Business School, Southeast European Research Centre (SEERC)) · Faye Ververidou (York Europe Campus, Business School, Southeast European Research Centre (SEERC)) · Filip Ejdus (University of Belgrade) · Sonja Stojanovic Gajic (Center for Advanced Studies Southeast Europe, the University of Rijeka and the Centre for International Security of the Faculty of Political Science, the University of Belgrade3)

  3. Cyber and Digital Sovereignty

    ‘D House’, Lecture Rooms 8 and 9

    Vorsitz:Moritz Weiss (LMU Munich), Eugenio Sánchez (--)

    Beiträge anzeigen (4)
    1. AI-Driven Cloud Monitoring and Cyber Situational Awareness in European Digital Infrastructures

      Prof. Daniela Mechkaroska (University of Information Science and Technology “St. Paul the Apostle”, Ohrid, N.Macedonia)

      Abstract: Artificial intelligence (AI) and cloud computing, combined with IoT systems through digital interconnection, create virtual environments that merge with physical spaces. The new operational capabilities that these transformations bring to European digital ecosystems create security challenges, governance issues and societal concerns. Existing… Vollständiges Abstract lesen

    2. Quantum-Resilient SATIN and European Digital Sovereignty

      Dr Gürkan Gür (Zurich University of Applied Sciences ZHAW)

      This contribution presents and discusses quantum-resilient Space–Aerial–Terrestrial Networks (SATIN) as a crucial enabler of European future-proof digital sovereignty, strengthening secure communications, resilient critical infrastructure, and reinforcing Europe’s leadership across satellite, drone, and terrestrial networking domains.

    3. From National Incident Response to Zero Trust: Bridging Cyber Defence Policy and Technical Implementation in Wartime Ukraine

      Vladyslav Vilihura

      The ongoing armed conflict in Ukraine has served as an unprecedented stress test for national cybersecurity frameworks, exposing both the capabilities and limitations of existing cyber defence architectures under sustained adversarial pressure. This paper examines two interrelated dimensions of cybersecurity governance that have gained acute relevance in… Vollständiges Abstract lesen

    4. Classical geopolitics in cyberspace: Explaining cyber state behaviour with power position

      Lorenz Sommer (Geschwister-Scholl-Institute for Political Science, LMU Munich)

      Cyberspace is a new domain of state security competition that differs from the conventional and nuclear realms, most notably because states are constantly engaged in cyberspace operations below the threshold of armed attacks. This inclines many scholars to use new approaches, both theoretically and empirically, to measure and explain cyber state behaviour.… Vollständiges Abstract lesen

    Stepping into the Future: Military Technology, Innovation Practices, and Contemporary Challenges

    ‘D House’, Lecture Rooms 8 and 9

    Vorsitz:Jennifer Erickson

    Beiträge anzeigen (4)
    1. Selling the Future of War: Discursive Power and Military Innovation

      Nicolas Krieger (Technical University of Munich)

      How do ideas about military technology become politically influential? This paper sets out to examines how competing visions of military technology emerge, gain dominance, and shape German defence planning. It focuses on public debates surrounding ‘classic’ (armour, artillery, etc.) and innovative military technologies (autonomous weapon systems, AI… Vollständiges Abstract lesen

    2. Disclosure and Duplicity: How Technology Influences International Competition

      Tristan Volpe (IFSH University of Hamburg / Naval Postgraduate School) · Prof. Jane Vaynman (SAIS Johns Hopkins)

      How do states manage information when building military capabilities? Some weapons are developed openly while others are concealed within secret programs or disguised behind civilian cover. This article introduces arming strategy as a new dependent variable, arguing that two technology attributes shape the disclosure and deception choices critical to… Vollständiges Abstract lesen

    3. Winning the Battles of Innovation and Production: How Russia and Ukraine Mobilize STEM Expertise and Industry

      Kristen Harkness (University of St. Andrews) · Marc DeVore (University of St. Andrews)

      The Russo-Ukrainian War stands out as the first war within decades that drove states to mobilize their industrial and innovative potential. Overwhelmingly, wars since 1945 have either been short or have been fought at lower levels of intensity. As such, they were won or lost based on the equipment already in stock or that could be procured through peacetime… Vollständiges Abstract lesen

    4. Sending the Wrong Signals: When Armaments Worry Allies

      Tim Thies (Institute for Peace Research and Security Policy at the University of Hamburg)

      While the role of armaments, and in particular forward-deployed military forces, as signals of reassurance is well-established in the scholarly literature, existing research has not explored when and why armaments may worry allies. In this paper, I consider disagreements between allies about the right armaments by the patron for the defense of a client as… Vollständiges Abstract lesen

  4. Lunch

  5. War & Strategy: Strategic Deterrence under Duress

    ‘D House’, Lecture Rooms 8 and 9

    Vorsitz:Jan Angstrom (Swedish Defence University)

    Beiträge anzeigen (4)
    1. Explaining Heterogeneity in Public Support for Collective Defense in NATO: Evidence from a Cross - National Survey of Allied Countries

      Isabelle Haynes (Charles University)

      The deteriorating European security environment underscores the continuing relevance of NATO’s collective defence commitments. Since NATO is a military alliance comprising 32 electoral democracies, the commitment to defend any member relies on the domestic politics of its members. For these commitments to be credible, the alliance requires domestic… Vollständiges Abstract lesen

    2. The Confidence Trap: Leader-Advisor Deliberations and the Making of (In)Credible Threats

      Wendy He (S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University (NTU))

      Conventional wisdom holds that states with superior capabilities, clear interests, and strong reputations issue more credible threats, while weaker states struggle to convince. Yet strong states sometimes fail to convince while weaker states occasionally succeed. Why? I argue that credibility is first formed within internal deliberations, shaped by how… Vollständiges Abstract lesen

    3. Cooperation under Stress: Organisational Compatibility and NATO–EU Cooperation in a Fractured Transatlantic Order

      Mark Rhinard (Stockholm University) · Dr Niklas Bremberg

      Recent debates on transatlantic security cooperation widely assume that renewed political tensions -- most notably driven by the Trump II administration -- have undermined cooperation between NATO and the European Union. Such claims typically rest on assessments of strategic alignment at the political level. This paper argues that these assessments risk… Vollständiges Abstract lesen

    4. Soft Power as Deterrence: Non-Kinetic Strategy and Alignment Politics in U.S.–China Competition

      Mr Joseph Black (Chiang Mai University, King's College London)

      Deterrence is conventionally understood as the prevention of unwanted actions through the threat of military retaliation or economic punishment. This paper argues that such a conception is increasingly insufficient for explaining how influence and restraint operate in contemporary strategic competition. Drawing on debates in deterrence theory, grand… Vollständiges Abstract lesen

    Military Transformation: Innovation and Strategic Change in the Transatlantic Context

    ‘D House’, Lecture Rooms 8 and 9

    Vorsitz:Magnus Petersson (Stockholm University), Magnus Petersson (Stockholm University)

    Beiträge anzeigen (4)
    1. The EU as a 21st Century Security State, Formed by Geopolitics and Bellicist Threat

      Kaija Schilde (Boston University)

      This paper challenges the conventional assumption that EU political development lacks a bellicist foundation. I argue that external threats have been a necessary condition driving EU integration throughout its history, and that the EU can be understood as a 21st century regulatory security state. Drawing on original archival research from the Jean Monnet… Vollständiges Abstract lesen

    2. NATO Military Capabilities and the Russian Threat: A Difference-in-Differences Analysis of the 2014 Russian Invasion

      Jordan Becker (United States Military Academy, West Point, Brussels School of Governance, Ecole de Guerre (IHEDN, IRSEM))

      Following the 2014 Russian invasion of Ukraine and annexation of Crimea, most research examining NATO's response has focused on member state pledges to increase defense spending to at least two percent of GDP. Far less attention has been paid to whether and how NATO members' \textit{military capabilities}--the outputs of defense investment--changed in… Vollständiges Abstract lesen

    3. From Platforms to Networks: The Political Hurdles of Transitioning to Data-Centric Warfare

      Mr Dumitru-Catalin Vasile (National School of Political and Administrative Studies, Bucharest, Romania)

      Modern military strategy is undergoing a paradigm shift, moving away from a "platform-centric" model defined by the capabilities of individual assets such as tanks, fighter jets, and carriers toward a "network-centric" model prioritizing connectivity, data fusion, and multi-domain integration. While the operational necessity of this transition is widely… Vollständiges Abstract lesen

    4. NATO as an Innovation Hub? How Emerging and Disruptive Technologies Are Reshaping Allied Innovation

      Vasiliki Plessia Aravani (Diplomatische Academie Wien, University of Vienna)

      The literature on military diffusion has traditionally treated alliances as transmission paths through which nationally developed military technologies are disseminated among allies. In this view, NATO is exclusively portrayed as a forum for standardization and doctrinal coordination rather than also a site of military innovation. This paper revisits this… Vollständiges Abstract lesen

  6. Beyond the State: Securitization, Governance, and Private Actors

    ‘D House’, Lecture Rooms 8 and 9

    Vorsitz:Mark Rhinard (Stockholm University)

    Beiträge anzeigen (4)
    1. Beyond the State: Voluntary Civilian Pro-Defence Organisations and Security Governance in Georgia

      Rusudan Zabakhidze (Swedish Defence University)

      This paper explores how the resurgence of interstate war in Europe following Russia’s full-scale invasion of Ukraine has reconfigured relations between defence and society, with particular attention to the role of voluntary pro-defence organisations in security governance. Over the past decade, states historically alert to Russian imperialism have… Vollständiges Abstract lesen

    2. From Privateers to Private Maritime Security: Irregular Maritime Actors and the Long History of Delegated Security at Sea

      Pieter Zhao (Erasmus University Rotterdam)

      This paper examines the re-emergence of private maritime security companies (PMSCs) in the late twentieth and early twenty-first centuries, situating their rise within both recent developments in maritime security and a broader historical context. Since the early 2000s, PMSCs have become a visible feature of global shipping security, particularly in… Vollständiges Abstract lesen

    3. Criminalising Solidarity: Border Securitisation, Non-State Actors, and Vernacular Humanitarianism in Europe

      Mia Abdić

      Border securitisation, externalisation, and the criminalisation of humanitarian assistance in migration contexts have become increasingly prominent features of European migration governance. This paper explores the phenomenon of the criminalisation of solidarity through a comparative overview of these practices in France, Italy, Greece, and Spain, alongside… Vollständiges Abstract lesen

    4. The Strategic Logic of Violence During Negotiations

      Johannes Lucht (ETH Zurich)

      Negotiations are essential to ending armed conflict, yet we know surprisingly little about how violence evolves during the negotiation process itself. While existing research demonstrates that negotiations are essential for ending armed conflicts, most studies treat “negotiations” as a single event rather than a dynamic, multi-round process. This paper… Vollständiges Abstract lesen

    Extended Nuclear Deterrence through European Eyes

    ‘D House’, Lecture Rooms 8 and 9

    Vorsitz:Ludovica Castelli

    Beiträge anzeigen (4)
    1. 'Europe is Not a Country': Nuclear Patronage and Eurodeterrence Concerns in the Frontline States

      Christopher David LaRoche (Carnegie Endowment for International Peace, Central European University)

    2. Conceptualizing Nuclear Umbrellas

      Alexander Sorg (Hertie School)

  7. Coffee break

  8. Regional Security in the Balkans

    ‘D House’, Lecture Rooms 8 and 9

    Vorsitz:Filip Ejdus (University of Belgrade)

    Beiträge anzeigen (4)
    1. Western Balkan Criminal Groups and the Transformation of Regional Security

      Dr Kire Babanoski (Faculty of Security - Skopje, University "St. Kliment Ohridski" Bitola, North Macedonia)

      Criminal groups in the Western Balkans are influential non-state actors which informally regulate illegal markets, provide protection, and establish strategic partnerships with political and economic elites. They operate outside, alongside, and sometimes within state structures, and often through robust cross-border networks. They are quite flexible and… Vollständiges Abstract lesen

    2. Peace as Stalemate: Bosnia and Herzegovina, Forever Missions and the Strategic Logic of Frozen Peace

      Dr SENADA ŠELO ŠABIĆ (Institute for Development and International Relations, Zagreb, Croatia)

      More than three decades after the Dayton Peace Agreement, Bosnia and Herzegovina remains subject to a continuous international military presence and extensive external governance, yet without achieving political stability or institutional consolidation. This paper examines Bosnia as a paradigmatic case of forever missions and frozen peace: interventions… Vollständiges Abstract lesen

    3. Pitfalls of Transitional Justice and (In)Security in the Western Balkans: Case Study of Serbia

      Dr SANDRA CVIKIĆ (Institute of Social Sciences Ivo Pilar, Regional Center Vukovar)

      Drawing on the author's previous work, this paper offers insight into the implementation of transitional justice policies in the Western Balkans after the violent wars that accompanied the dissolution of socialist Yugoslavia, with a focus on the former Yugoslav state of Serbia. This qualitative sociological analysis explores the paradoxical effects of the… Vollständiges Abstract lesen

    4. Bosnia and Herzegovina on the Edge of European Stability

      Prof. Kenan Hodžić (Assistant Professor)

      Bosnia and Herzegovina occupies a critical position in the security architecture of the Western Balkans, serving as a nexus of domestic vulnerabilities, regional dynamics, and broader European security concerns. This paper employs the multi-level security framework (Buzan, Wæver & de Wilde, 1998) to examine the intersection of internal political… Vollständiges Abstract lesen

    Disruptive Machines: AI, Information Operations, and Cyber Security

    ‘D House’, Lecture Rooms 8 and 9

    Vorsitz:Dr Arthur Laudrain (ETH Zurich - CSS)

    Beiträge anzeigen (4)
    1. Resilience-by-Design in the Information Age: Tabletop Evidence on AI-Enabled Cybercrime, Coordination, and Public Trust

      Gil Baram (UC Berkeley and Bar Ilan University)

      Digital technologies are entangling cyber risk, digital infrastructure, and governance. This paper argues that AI-enabled cybercrime is best understood as a transformation of the cybercrime ecosystem rather than merely as a set of new technical tactics. It draws on UC Berkeley’s “AI-Enabled Cybercrime: Exploring Risks, Building Awareness, and Guiding Policy… Vollständiges Abstract lesen

    2. Financial (In)Security, TikTok, and the Far-Right Pipeline

      Clara Jammot

      While the relationship between far-right extremism, libertarianism, and neoliberalism has long been established, algorithmic recommendation as well as the lucrative professionalisation of content creation are leading platforms like TikTok to impact how financial (in)security feeds into the far-right’s proliferation. The rise in influencers promoting an… Vollständiges Abstract lesen

    3. Cyber risk logics and their implications for cybersecurity

      Sarah Backman (Försvarshögskolan)

      Cybersecurity in national and international security is frequently discussed in an existential register. However, most cybersecurity activities are normal and routine, including diverse practices of cyber risk management. The intricacies of cyber risk and its connection to security and threat politics have received surprisingly little attention in the cyber… Vollständiges Abstract lesen

    4. Amplification of Russian Geopolitical Narratives on VKontakte: Studying Tsargrad’s audience engagement and the construction of the enemy before and after the start of Russia’s full-scale invasion of Ukraine

      Alexandra Brankova (Swedish Defence University)

      The paper explores how Russian geopolitical narratives about the national self and the enemy are constructed and amplified on VKontakte (VK) before and after the start of Russia’s full-scale invasion of Ukraine. VK is the largest social media platform in the Russian Federation, and it is being gradually integrated into a government-led multipurpose… Vollständiges Abstract lesen

  9. Concluding Remarks

    ‘D House’, Lecture Rooms 8 and 9

    Vorsitz:Julia Carver (Leiden University), Moritz Weiss (LMU Munich), Magnus Petersson (Stockholm University), Magnus Petersson (Stockholm University)

  10. Reception & Poster Presentations

    Vorsitz:Fiona Galvis, Archishman Ray Goswami (DPhil International Relations, University of Oxford), Lucian Bumeder (IFSH), Gulzhan Asylbek kyzy (UNU-MERIT)

    Beiträge anzeigen (4)
    1. Speak through the Nocturne: Navigating Strategic Interest in Intelligence Diplomacy

      Archishman Ray Goswami (DPhil International Relations, University of Oxford)

Indico ist die maßgebliche Quelle für das Programm — dieses Raster ist ein tägliches Abbild. Veranstaltung auf Indico ansehen

Arbeitsversion des Programms — druckbares PDF (Änderungen vorbehalten)

2 Seiten107 KB 11. — 12. Juni 2026, Stockholm

Eine Arbeitsversion des Programms — das Live-Raster oben zeigt den aktuellen Stand.

Universität Stockholm

Jedes Jahr wird die European Security Conference in einem anderen europäischen Land organisiert. Die Konferenz 2026 findet im Rahmen der COST-Aktion NetSec an der Universität Stockholm statt.

Universität Stockholm in Google Maps öffnen

Sich in Stockholm bewegen

Der Veranstaltungsort der Konferenz, der Hauptcampus der Universität Stockholm, liegt entlang der „roten Linie" des öffentlichen Nahverkehrs der Stadt.

Wir empfehlen, eine Unterkunft in der Stadt in einem der folgenden Stadtviertel zu suchen:

Södermalm

Metros Hornstull, Zinkensdamm, Mariatorget, Slussen. Im Allgemeinen günstiger als andere Stadtviertel, mit mehr Hostel-Optionen.

Gamla stan

Die Altstadt — das historische Zentrum von Stockholm auf einer eigenen kleinen Insel.

T-centralen

Hauptbahnhof Stockholm — der zentrale Verkehrsknotenpunkt.

Östermalmstorg

Ein elegantes zentrales Viertel im Nordosten.

Stadion

In der Nähe des Olympiastadions von Stockholm von 1912 — nur einen Sprung vom Veranstaltungsort entfernt.

Unterkünfte sind in Södermalm in der Regel günstiger; dort finden Sie auch mehr Hostels.

Unterstützt durch Horizon Europe

Die COST-Aktion Networking European Security Knowledge (NetSec) (CA24154) wird vom Horizon-Programm der Europäischen Union unterstützt.

netsec-cost.eu besuchen

Gefördert von der Europäischen Union — Horizon-Programm.