By analysing intelligence-gathering reform legislation this article discusses access to justice for communications interception by the intelligence and security services. In the aftermath of the Snowden revelations, sophisticated oversight systems for bulk communications surveillance are being established across the globe. In the Netherlands prior judicial consent and a binding complaint procedure have been established. However, although checks and balances for targeted communications interference have been created, accountability mechanisms are less equipped to effectively remedy indiscriminate interference. Therefore, within the context of mass communications surveillance programs, access to justice for complainants remains a contentious issue.
MULTIFILE
This article examines the network structure, criminal cooperation, and external interactions of cybercriminal networks. Its contribution is empirical and inductive. The core of this study involved carrying out 10 case analyses on closed cybercrime investigations – all with financial motivations on the part of the offenders - in the UK and beyond. Each analysis involved investigator interview and access to unpublished law enforcement files. The comparison of these cases resulted in a wide range of findings on these cybercriminal networks, including: a common division between the scam/attack components and the money components; the presence of offline/local elements; a broad, and sometimes blurred, spectrum of cybercriminal behaviour and organisation. An overarching theme across the cases that we observe is that cybercriminal business models are relatively stable.
DOCUMENT
In this paper, we experimentally compare orthogonal frequency-division multiplexing (OFDM) and on-off keying (OOK) modulation in the context of the IEEE 802.15.13-2023 standard at bandwidths up to 50 MHz across a Li-Fi link with distances up to 5 m and a lateral offset up to 51°. Error vector magnitude (EVM) and bit error rate (BER) evaluations confirm that the high peak-to-average power ratio (PAPR) of OFDM limits the achievable transmission distance, but it offers higher data rates due to its higher spectral efficiency. Due to the lower PAPR, OOK-based Pulsed Modulation PHY (PM-PHY) shows a significantly higher link range. As the structure of the PM-PHY is based on OFDM symbols, the two solutions may also be combined to open a wider range of use cases for optical wireless communications.
LINK
Data is widely recognized as a potent catalyst for advancing healthcare effectiveness, increasing worker satisfaction, and mitigating healthcare costs. The ongoing digital transformation within the healthcare sector promises to usher in a new era of flexible patient care, seamless inter-provider communication, and data-informed healthcare practices through the application of data science. However, more often than not data lacks interoperability across different healthcare institutions and are not readily available for analysis. This inability to share data leads to a higher administrative burden for healthcare providers and introduces risks when data is missing or when delays occur. Moreover, medical researchers face similar challenges in accessing medical data due to thedifficulty of extracting data from applications, a lack of standardization, and the required data transformations before it can be used for analysis. To address these complexities, a paradigm shift towards a data-centric application landscape is essential, where data serves as the bedrock of the healthcare infrastructure and is application agnostic. In short, a modern way to think about data in general is to go from an application driven landscape to a data driven landscape, which will allow for better interoperability and innovative healthcare solutions.In the current project the research group Digital Transformation at Hanze University of Applied Sciences works together with industry partners to build an openEHR implementation for a Groningen-based mental healthcare provider.
DOCUMENT
The energy management systems industry in the built environment is currently an important topic. Buildings use about 40% of the total global energy worldwide. Therefore, the energy management system’s sector is one of the most influential sectors to realize changes and transformation of energy use. New data science technologies used in building energy management systems might not only bring many technical challenges, but also they raise significant educational challenges for professionals who work in the field of energy management systems. Learning and educational issues are mainly due to the transformation of professional practices and networks, emerging technologies, and a big shift in how people work, communicate, and share their knowledge across the professional and academic sectors. In this study, we have investigated three different companies active in the building services sector to identify the main motivation and barriers to knowledge adoption, transfer, and exchange between different professionals in the energy management sector and explore the technologies that have been used in this field using the boundary-crossing framework. The results of our study show the importance of understanding professional learning networks in the building services sector. Additionally, the role of learning culture, incentive structure, and technologies behind the educational system of each organization are explained. Boundary-crossing helps to analyze the barriers and challenges in the educational setting and how new educational technologies can be embedded. Based on our results, future studies with a bigger sample and deeper analysis of technologies are needed to have a better understanding of current educational problems.
DOCUMENT
This review of meta-analyses of outcome studies of adults receiving Computer-Based Health Education (CBHE) has two goals. The first is to provide an overview of the efficacy of CBHE interventions, and the second is to identify moderators of these effects. A systematic literature search resulted in 15 meta-analyses of 278 controlled outcome studies. The meta-analyses were analysed with regard to reported (overall) effect sizes, heterogeneity and interaction effects. The results indicate a positive relationship between CBHE interventions and improvements in health-related outcomes, with small overall effect sizes compared to non-computer-based interventions. The sustainability of the effects was observed for up to six months. Outcome moderators (31 variables) were studied in 12 meta-analyses and were clustered into three categories: intervention features (20 variables), participant characteristics (five variables) and study features (six variables). No relationship with effectiveness was found for four intervention features, theoretical background, use of internet and e-mail, intervention setting and self-monitoring; two participant features, age and gender; and one study feature, the type of analysis. Regarding the other 24 identified features, no consistent results were observed across meta-analyses. To enhance the effectiveness of CBHE interventions, moderators of effects should be studied as single constructs in high-quality study designs. http://www.journalofinterdisciplinarysciences.com/ https://www.linkedin.com/in/leontienvreeburg/
DOCUMENT
Business is changing from an industrial- to a knowledge-based environment, building more from professionals and their expertise. Corporations need to create internal organizations in which there is more emphasis on human capital and creating/sharing knowledge and talents. Talent management and knowledge creation should be new foci to create sustainability and long-term success. On the whole, organisations are working too much on an ad hoc basis, focusing on technology instead of creating an environment in which talents reinforce each other. In this review article we explore knowledge circulation, link knowledge, and talent to innovation, and discuss optimum circumstances for corporations to benefit from these assets.
DOCUMENT
Computer security incident response teams (CSIRTs) respond to a computer security incident when the need arises. Failure of these teams can have far-reaching effects for the economy and national security. CSIRTs often have to work on an ad hoc basis, in close cooperation with other teams, and in time constrained environments. It could be argued that under these working conditions CSIRTs would be likely to encounter problems. A needs assessment was done to see to which extent this argument holds true. We constructed an incident response needs model to assist in identifying areas that require improvement. We envisioned a model consisting of four assessment categories: Organization, Team, Individual and Instrumental. Central to this is the idea that both problems and needs can have an organizational, team, individual, or technical origin or a combination of these levels. To gather data we conducted a literature review. This resulted in a comprehensive list of challenges and needs that could hinder or improve, respectively, the performance of CSIRTs. Then, semi-structured in depth interviews were held with team coordinators and team members of five public and private sector Dutch CSIRTs to ground these findings in practice and to identify gaps between current and desired incident handling practices. This paper presents the findings of our needs assessment and ends with a discussion of potential solutions to problems with performance in incident response. https://doi.org/10.3389/fpsyg.2017.02179 LinkedIn: https://www.linkedin.com/in/rickvanderkleij1/
MULTIFILE
The aim of this study was to understand the motives for using the Internet, and its associations with users' attitudes, social values, and relational involvement. Also, this study attempted to crossculturally compare the difference in the pattern of motives and the associations among three countries ' the US, the Netherlands, and S. Korea. The design of methods was based on examination and revision of uses and gratification approach toward Internet users. Findings from factor analysis revealed that information seeking and Self-Improvement were the dominant and common reasons for using the Internet across three countries. The differences in the composition of motives in each country were also reported. Strong correlations across countries were found between all the motives and satisfaction of the Internet. Expectation and positive evaluation of the Internet were also important attitudes associated with Internet use motives. Postmaterialist value showed strong association with motives of information seeking and Self-Improvement. Community involvement was significantly associated with Internet use motives in Korean users.
DOCUMENT
Energy conservation is crucial in wireless ad hoc sensor network design to increase network lifetime. Since communication consumes a major part of the energy used by a sensor node, efficient communication is important. Topology control aims at achieving more efficient communication by dropping links and reducing interference among simultaneous transmissions by adjusting the nodes’ transmission power. Since dropping links make a network more susceptible to node failure, a fundamental problem in wireless sensor networks is to find a communication graph with minimum interference and minimum power assignment aiming at an induced topology that can satisfy fault-tolerant properties. In this paper, we examine and propose linear integer programming formulations and a hybrid meta-heuristic GRASP/VNS (Greedy Randomized Adaptive Search Procedure/Variable Neighborhood Search) to determine the transmission power of each node while maintaining a fault-tolerant network and simultaneously minimize the interference and the total power consumption. Optimal biconnected topologies for moderately sized networks with minimum interference and minimum power are obtained using a commercial solver. We report computational simulations comparing the integer programming formulations and the GRASP/VNS, and evaluate the effectiveness of three meta-heuristics in terms of the tradeoffs between computation time and solution quality. We show that the proposed meta-heuristics are able to find good solutions for sensor networks with up to 400 nodes and that the GRASP/VNS was able to systematically find the best lower bounds and optimal solutions.
DOCUMENT