While criminality is digitizing, a theory-based understanding of the impact of cybercrime on victims is lacking. Therefore, this study addresses the psychological and financial impact of cybercrime on victims, applying the shattered assumptions theory (SAT) to predict that impact. A secondary analysis was performed on a representative data set of Dutch citizens (N = 33,702), exploring the psychological and financial impact for different groups of cybercrime victims. The results showed a higher negative impact on emotional well-being for victims of person-centered cybercrime, victims for whom the offender was an acquaintance, and victims whose financial loss was not compensated and a lower negative impact on emotional well-being for victims with a higher income. The study led to novel scientific insights and showed the applicability of the SAT for developing hypotheses about cybercrime victimization impact. In this study, most hypotheses had to be rejected, leading to the conclusion that more work has to be done to test the applicability of the SAT in the field of cybercrime. Furthermore, policy implications were identified considering the prioritization of and approach to specific cybercrimes, treatment of victims, and financial loss compensation.
MULTIFILE
The goal of a local energy community (LEC) is to create a more sustainable, resilient, and efficient energy system by reducing dependence on centralized power sources and enabling greater participation and control by local communities and individuals. LEC requires transformations in local energy systems, and strongly depends on the preferences and actions of the local actors involved. The necessity for extensive stakeholder involvement adds complexity to the energy transition, posing a significant challenge for all involved parties. The municipality of Leidschendam-Voorburg has committed to the national decision for energy transition. It has taken a strategic approach by proceeding De Heuvel/Amstelwijk as the pioneer in this initiative, leading the way for other neighborhoods to follow. It is crucial to devise strategies that effectively facilitate stakeholder engagement. To this end, a thorough stakeholder analysis is needed. Such an analysis can focus on the identification of key stakeholders, their interests, their influence, and their behavioral characteristics in relation to the energy transition. Additionally, it's crucial to uncover the challenges encountered by these stakeholders and finally develop appropriate strategies to address them hence enhance their engagement. This thesis begins with an introduction to the research background, including a presentation of the case study and a statement of the problem identified in the field, followed by the research questions underpinning the study. A thorough literature review ensues, providing a robust synthesis of existing research relating to stakeholder engagement in LECs, with a view to expediting energy transitions. The literature review not only forms the foundation for the research methods adopted in this study but also promotes in the construction of the conceptual model. Subsequent to the literature review, the research method is detailed. The filed research is conducted in five steps: Step 1 - identification of stakeholders, Step 2 - prioritization of stakeholders, Step 3 - interviewing, Step 4 - data analysis, including stakeholder profiling with mapping and addressing challenges, and finally, Step 5 - proposal of strategies for stakeholder engagement enhancement based on the expected and current levels of stakeholders engagement. This research collects necessary information to understand the profiles of stakeholders in De Heuvel/Amstelwijk, tackle challenges faced by different stakeholders, propose strategies to increase stakeholders engagement. It not only aims to enrich the depth of theoretical knowledge on the subject matter but also strives to aid in the development of a localized energy strategy that is optimally suited for the De Heuvel/Amstelwijk neighborhood as good example for other neighborhoods.
Introduction: The implementation of oncology care pathways that standardize organizational procedures has improved cancer care in recent years. However, the involvement of “authentic” patients and caregivers in quality improvement of these predetermined pathways is in its infancy, especially the scholarly reflection on this process. We, therefore, aim to explore the multidisciplinary challenges both in practice, when cancer patients, their caregivers, and a multidisciplinary team of professionals work together on quality improvement, as well as in our research team, in which a social scientist, health care professionals, health care researchers, and experience experts design a research project together. Methods and design: Experience-based co-design will be used to involve cancer patients and their caregivers in a qualitative research design. In-depth open discovery interviews with 12 colorectal cancer patients, 12 breast cancer patients, and seven patients with cancer-associated thrombosis and their caregivers, and focus group discussions with professionals from various disciplines will be conducted. During the subsequent prioritization events and various co-design quality improvement meetings, observational field notes will be made on the multidisciplinary challenges these participants face in the process of co-design, and evaluation interviews will be done afterwards. Similar data will be collected during the monthly meetings of our multidisciplinary research team. The data will be analyzed according to the constant comparative method. Discussion: This study may facilitate quality improvement programs in oncologic care pathways, by increasing our real-world knowledge about the challenges of involving “experience experts” together with a team of multidisciplinary professionals in the implementation process of quality improvement. Such co-creation might be challenging due to the traditional paternalistic relationship, actual disease-/treatment-related constraints, and a lack of shared language and culture between patients, caregivers, and professionals and between professionals from various disciplines. These challenges have to be met in order to establish equality, respect, team spirit, and eventual meaningful participation.
Prompt and timely response to incoming cyber-attacks and incidents is a core requirement for business continuity and safe operations for organizations operating at all levels (commercial, governmental, military). The effectiveness of these measures is significantly limited (and oftentimes defeated altogether) by the inefficiency of the attack identification and response process which is, effectively, a show-stopper for all attack prevention and reaction activities. The cognitive-intensive, human-driven alarm analysis procedures currently employed by Security Operation Centres are made ineffective (as opposed to only inefficient) by the sheer amount of alarm data produced, and the lack of mechanisms to automatically and soundly evaluate the arriving evidence to build operable risk-based metrics for incident response. This project will build foundational technologies to achieve Security Response Centres (SRC) based on three key components: (1) risk-based systems for alarm prioritization, (2) real-time, human-centric procedures for alarm operationalization, and (3) technology integration in response operations. In doing so, SeReNity will develop new techniques, methods, and systems at the intersection of the Design and Defence domains to deliver operable and accurate procedures for efficient incident response. To achieve this, this project will develop semantically and contextually rich alarm data to inform risk-based metrics on the mounting evidence of incoming cyber-attacks (as opposed to firing an alarm for each match of an IDS signature). SeReNity will achieve this by means of advanced techniques from machine learning and information mining and extraction, to identify attack patterns in the network traffic, and automatically identify threat types. Importantly, SeReNity will develop new mechanisms and interfaces to present the gathered evidence to SRC operators dynamically, and based on the specific threat (type) identified by the underlying technology. To achieve this, this project unifies Dutch excellence in intrusion detection, threat intelligence, and human-computer interaction with an industry-leading partner operating in the market of tailored solutions for Security Monitoring.