Service of SURF
© 2025 SURF
Crew resource management (CRM) training for flight crews is widespread and has been credited with improving aviation safety. As other industries have adopted CRM, they have interpreted CRM in different ways. We sought to understand how industries have adopted CRM, regarding its conceptualisation and evaluation. For this, we conducted a systematic review of CRM studies in theMaritime, Nuclear Power, Oil and Gas, and Air Traffic Control industries. We searched three electronic databases (Web of Science, Science Direct, Scopus) and CRM reviews for papers. We analysed these papers on their goals, scope, levers of change, and evaluation. To synthesise, we compared the analysis results across industries. We found that most CRM programs have the broad goals of improving safety and efficiency. However, there are differences in the scope and levers of change between programs, both within and between industries. Most evaluative studies suffer from methodological weaknesses, and the evaluation does not align with how studies conceptualise CRM. These results challenge the assumption that there is a clear link between CRM training and enhanced safety in the analysed industries. Future CRM research needs to provide a clear conceptualisation—how CRM is expected to improve safety—and select evaluation measures consistent with this.
Self-organisation in environmental service delivery is increasingly being promoted as an alternative to centralised service delivery. This article argues that self-organised environmental service delivery must be understood in the context of legal rules, especially environmental legislation. The article’s aim is twofold: first, to understand the changing relationship between the government and citizens in self-organised service delivery, and second, to explore how self-organised environmental service delivery complies with environmental quality requirements stipulated in legislation. The empirical study focuses on wastewater management in Oosterwold, the largest Dutch urban development that experimented with self-organisation. The results show that while individual wastewater management was prioritised and implemented at scale, the applicable legal rules were not adequately considered and integrated. Consequently, the experiment led to a deterioration of water quality. The article concludes that the success or failure of self-organisation in delivering environmental services such as wastewater management critically hinges on ensuring compliance with environmental legislation.
From the article: "The object of this paper is to explore the actual practice in project management education in the Netherlands and compare it to reference institutions and recent literature. A little over 40% of the Higher Education institutions in the Netherlands mentions PM education in programs and/or courses. A total of 264 courses, minors and programs in the Netherlands found. In reference institutions 33 courses and programs are found and 36 publications deal with actual teaching of project management in Higher Education. Comparing these sources finds traditional methods of teaching and testing, a roughly comparable focus on subjects and an unsupported high claim of learning level, while the number of credits assigned to project management is relatively small. There is a strong focus on planning without execution, which is critiqued as is the promoted Project Based Learning."
This project addresses the fundamental societal problem that encryption as a technique is available since decades, but has never been widely adopted, mostly because it is too difficult or cumbersome to use for the public at large. PGP illustrates this point well: it is difficult to set-up and use, mainly because of challenges in cryptographic key management. At the same time, the need for encryption has only been growing over the years, and has become an urgent problem with stringent requirements – for instance for electronic communication between doctors and patients – in the General Data Protection Regulation (GDPR) and with systematic mass surveillance activities of internationally operating intelligence agencies. The interdisciplinary project "Encryption for all" addresses this fundamental problem via a combination of cryptographic design and user experience design. On the cryptographic side it develops identity-based and attribute-based encryption on top of the attribute-based infrastructure provided by the existing IRMA-identity platform. Identity-based encryption (IBE) is a scientifically well-established technique, which addresses the key management problem in an elegant manner, but IBE has found limited application so far. In this project it will be developed to a practically usable level, exploiting the existing IRMA platform for identification and retrieval of private keys. Attribute-based encryption (ABE) has not reached the same level of maturity yet as IBE, and will be a topic of further research in this project, since it opens up attractive new applications: like a teacher encrypting for her students only, or a company encrypting for all employees with a certain role in the company. On the user experience design side, efforts will be focused on making these encryption techniques really usable (i.e., easy to use, effective, efficient, error resistant) for everyone (e.g., also for people with disabilities or limited digital skills). To do so, an iterative, human-centred and inclusive design approach will be adopted. On a fundamental level, scientific questions will be addressed, such as how to promote the use of security and privacy-enhancing technologies through design, and whether and how usability and accessibility affect the acceptance and use of encryption tools. Here, theories of nudging and boosting and the unified theory of technology acceptance and use (known as UTAUT) will serve as a theoretical basis. On a more applied level, standards like ISO 9241-11 on usability and ISO 9241-220 on the human-centred design process will serve as a guideline. Amongst others, interface designs will be developed and focus groups, participatory design sessions, expert reviews and usability evaluations with potential users of various ages and backgrounds will be conducted, in a user experience and observation laboratory available at HAN University of Applied Sciences. In addition to meeting usability goals, ensuring that the developed encryption techniques also meet national and international accessibility standards will be a particular point of focus. With respect to usability and accessibility, the project will build on the (limited) usability design experiences with the mobile IRMA application.