This chapter discusses the sharing economy in the Netherlands, focussing on shared mobility and gig work platforms. The Netherlands has been known as one of the pioneers in the sharing economy. Local initiatives emerged at the beginning of the 2010s. International players such as Uber, UberPop, and Airbnb followed soon after. Initially, the sharing economy was greeted with a sense of optimism, as it was thought to contribute to social cohesion and sustainability. Over the last few years, the debate has shifted to the question of how public values can be safeguarded or stimulated. In this regard, shared mobility is hoped to contribute to more sustainable transport. In the gig economy, scholars and labour representatives fear a further flexibilisation of labour; others see opportunities for economic growth.
Gedeelde besluitvorming is in de praktijk niet zo eenvoudig. SDM vraagt van zowel de verpleegkundige als de patiënt eigenschappen die niet vanzelfsprekend aanwezig zijn. De verpleegkundige dient in staat te zijn verschillende mogelijkheden met de voor- en nadelen te presenteren en daarnaast de patiënt de ruimte te geven een keuze te maken die het best bij hem past. Deze werkwijze past goed in een persoonsgerichte visie, waarin gedeelde besluitvorming of samen beslissen en empowerment belangrijke elementen zijn.
LINK
In the Netherlands, many parents of children with profound intellectual and multiple disabilities care for their children at home. Little is known about how parents and involved healthcare professionals share and align medical care for these children. This study aims to contribute to a better understanding of the dimensions that affect how medical care is shared and how healthcare professionals can align care with family needs. The study design was inspired by grounded theory. We analyzed in-depth interviews with 25 Dutch parents. The analysis identified five dimensions affecting how parents and professionals shared and aligned medical care: fragility, planned care, irregularities, interactions with providers, and parents’ choices. We recognized three distinctive ways these dimensions interplayed, characterizing scenarios of sharing care: dependent care, dialogical care, and autonomous care. The findings illuminated that parental distress decreased when parents could communicate about what they considered important for their child and family and its implications for sharing care. Parents developed their capacity to manage medical care and often evolved in their thinking about the quality of care and life. Sometimes this evolution was due to struggles with the care provided by professionals. Therefore, healthcare professionals may need to broaden the relational work of shared decision-making to include the sharing of medical care. Arrangements need to be continually reassessed as changes in the child’s and family’s situation trigger changes in preferred patterns of sharing care. Commitment to parents’ autonomy implies that healthcare professionals should be attentive to the parents’ emotional and relational needs.
MULTIFILE
The modern economy is largely data-driven and relies on the processing and sharing of data across organizations as a key contributor to its success. At the same time, the value, amount, and sensitivity of processed data is steadily increasing, making it a major target of cyber-attacks. A large fraction of the many reported data breaches happened in the healthcare sector, mostly affecting privacy-sensitive data such as medical records and other patient data. This puts data security technologies as a priority item on the agenda of many healthcare organizations, such as of the Dutch health insurance company Centraal Ziekenfonds (CZ). In particular when it comes to sharing data securely, practical data protection technologies are lacking as they mostly focus on securing the link between two organizations while being completely oblivious of what is happening with the data after sharing. For CZ, searchable encryption (SE) technologies that allow to share data in encrypted form, while enabling the private search on this encrypted data without the need to decrypt, are of particular interest. Unfortunately, existing efficient SE schemes completely leak the access pattern (= pattern of encrypted search results, e.g. identifiers of retrieved items) and the search pattern (= pattern of search queries, e.g. frequency of same queries), making them susceptible to leakage-abuse attacks that exploit this leakage to recover what has been queried for and/or (parts of) the shared data itself. The SHARE project will investigate ways to reduce the leakage in searchable encryption in order to mitigate the impact of leakage-abuse attacks while keeping the performance-level high enough for practical use. Concretely, we propose the construction of SE schemes that allow the leakage to be modeled as a statistic released on the queries and shared dataset in terms of ε-differential privacy, a well-established notion that informally says that, after observing the statistic, you learn approximately (determined by the ε-parameter) the same amount of information about an individual data item or query as if the item was not present in the dataset or the query has not been performed. Naturally, such an approach will produce false positives and negatives in the querying process, affecting the scheme’s performance. By calibrating the ε-parameter, we can achieve various leakage-performance trade-offs tailored to the needs of specific applications. SHARE will explore the idea of differentially-private leakage on different parts of SE with different search capabilities, starting with exact-keyword-match SE schemes with differentially-private leakage on the access pattern only, up to schemes with differentially-private leakage on the access and search pattern as well as on the shared dataset itself, allowing for more expressive query types like fuzzy match, range, or substring queries. SHARE comes with an attack lab in which we investigate existing and new types of leakage-abuse attacks to assess the mitigation-potential of our proposed combination of differential privacy with cryptographic guarantees in searchable encryption. To stimulate commercial exploitation of SHARE-results, our consortium partners CZ and TNO will take the lead on applying and evaluating our envisioned technologies in various healthcare use-cases.