Patients with non-specific low back pain (LBP) may use postural control strategies that differ from healthy subjects. To study these possible differences, we measured the amount and structure of postural sway, and the response to muscle vibration in a working cohort of 215 subjects. Subjects were standing on a force plate in bipedal stance. In the first trial the eyes were open, no perturbation applied. In the following 6 trials, vision was occluded and subjects stood under various conditions of vibration/no vibration of the lumbar spine or m. Triceps Surae (TSM) on firm surface and on foam surface. We performed a factor analysis to reduce the large amount of variables that are available to quantify all effects. Subjects with LBP showed the same amount of sway as subjects without LBP, but the structure of their sway pattern was less regular with higher frequency content. Subjects with LBP also showed a smaller response to TSM vibration, and a slower balance recovery after cessation of vibration when standing on a solid surface. There was a weak but significant association between smaller responses to TSM vibration and an irregular, high frequency sway pattern, independent from LBP. A model for control of postural sway is proposed. This model suggests that subjects with LBP use more co-contraction and less cognitive control, to maintain a standing balance when compared to subjects without LBP. In addition, a reduced weighting of proprioceptive signals in subjects with LBP is suggested as an explanation for the findings in this study.
LINK
DOCUMENT
Human rights groups are increasingly calling for the protection of their right to privacy in relation to the bulk surveillance and interception of their personal communications. Some are advocating through strategic litigation. This advocacy tool is often chosen when there is weak political or public support for an issue. Nonetheless, as a strategy it remains a question if a lawsuit is strategic in the context of establishing accountability for indiscriminate bulk data interception. The chapter concludes that from a legal perspective the effect of the decision to litigate on the basis of the claim that a collective right to group privacy was violated has not (yet) resulted in significant change. Yet the case study, the British case of human rights groups versus the intelligence agencies, does seem to suggest that they have been able to create more public awareness about mass surveillance and interception programs and its side-effects
LINK
Many programs in entrepreneurship education (EE) offer modules or training in networking as a way for entrepreneurs to gather advice or co-create novel ideas with other people in their business networks. Unfortunately, the role of the diverse actors of those networks, such as family, friends and very close advisors, is taken for granted, or not explained when being applied to business. It seems that in EE, having a networks is assumed to naturally exist and there is little to be done except of expanding it. Yet, because students are in the process of forming their business, networks keep changing and strong ties need to be combined with weak ties to provide support for growth, and even more to provide a listening ear or unpaid support when it comes to early warning signals of potential business crisis.In this paper, we argue that students are better equipped for business when they pay attention to the composition of their networks, especially when it comes to deal with a potential failure. Based on interviews of students with entrepreneurs who experienced business crisis, the episode of failure become a unique case to look at those networks that provide the support and strength to keep the business. Having business networks signaling when the business was not going well led to seek external help to mitigate the impact of the crisis and recover. From these insights, we formulate the following question: How can entrepreneurship students be better equipped in terms of using business networks, especially to counteract signals of business crisis?
MULTIFILE
Introductie van het lectoraat Futures Research & Trendwatching.
DOCUMENT
The aim of this explorative study was to determine the key inertial measurement unit-based wheelchair mobility performance components during a wheelchair tennis match. A total of 64 wheelchair tennis matches were played by 15 wheelchair tennis players (6 women, 5 men, 4 juniors). All individual tennis wheelchairs were instrumented with inertial measurement units, two on the axes of the wheels and one on the frame. A total of 48 potentially relevant wheelchair tennis outcome variables were initially extracted from the sensor signals, based on previous wheelchair sports research and the input of wheelchair tennis experts (coaches, embedded scientists). A principal component analysis was used to reduce this set of variables to the most relevant outcomes for wheelchair tennis mobility. Results showed that wheelchair mobility performance in wheelchair tennis can be described by six components: rotations to racket side in (1) curves and (2) turns; (3) linear accelerations; (4) rotations to non-racket side in (4) turns and (5) curves; and finally, (6) linear velocities. One or two outcome variables per component were selected to allow an easier interpretation of results. These key outcome variables can be used to adequately describe the wheelchair mobility performance aspect of wheelchair tennis during a wheelchair tennis match and can be monitored during training.
DOCUMENT
Communication problems are acknowledged as hazardous eventualities affecting operations negatively. However, a few systematic attempts have been made to understand the pattern of communication issues and their contribution to safety events. In this paper, we present the AVAC-COM communication model and taxonomy based on the cybernetics approach and a literature review. The model elements and taxonomy variables regard the actors, signals, coders, interference, direction and timing, predictability, decoders, and channels. To test the applicability and potential value of the AVAC-COM framework, we analysed 103 safety investigation reports from aviation published between 1997 and 2016 by the respective authorities of Canada, the United States, Australia, the United Kingdom and the Netherlands. The overall results of the 256 cases of communication flaws detected in the reports suggested that these regarded more frequently Human-Media and Human-Human interactions, verbal and local communications as well as unfamiliarity of the receivers with the messages transmitted. Further statistical tests revealed associations of the region, time period, event severity and operations type with various variables of the AVAC-COM taxonomy. Although the findings are only indicative, they showed the potential of the AVAC-COM model and taxonomy to be used to identify strong and weak communication elements and relationships in documented data such as investigation and hazard reports.
DOCUMENT
This is an Accepted Manuscript of an article published by Taylor & Francis in INTERNATIONAL SPECTATOR on 31-01-2022, available online: https://www.tandfonline.com/doi/abs/10.1080/03932729.2021.2007610 In July 2015, after intense negotiations with its creditors, Greece received a bailout in exchange for fiscal restraint. The coalition government at that time, led by the left-wing SYRIZA party, elected on the basis of an anti-austerity platform, eventually accepted the prevalent austerity frames of the creditors. Through the aid of Q-method, an analysis of Greek opinion leaders’ views of the negotiation highlights that this outcome can be explained in two different ways. The first posits that the ideological overtones that ruling SYRIZA injected in its negotiation strategy exhibited a lack of socialisation and undermined Greece’s already weak bargaining position. The second focuses on the institutional status quo bias in the Eurogroup in Germany’s favour, which discourages any change in the Eurozone. These two views may have partly been influenced by questions of political accountability.
MULTIFILE
Wat is de beroepsidentiteit van sociaal werk, wat behoort zij te zijn? Sociaal werk wordt wel omschreven als een professie maar ook als een ambacht, vaak zonder duidelijk onderscheid tussen en wellicht zelfs door impliciete gelijkstelling van deze kwalificaties. Met behulp van de ideaaltypische benadering kan echter worden aangetoond dat deze twee typen beroepen niet alleen veel overeenkomsten delen maar ook op enkele punten fundamenteel van elkaar verschillen. Op basis van het werk van Freidson (2001) en Sennett (2008) kan worden aangetoond dat het ideaaltypische doel van professies het realiseren van een abstracte waarde (zoals rechtvaardigheid) is, terwijl ambachten gericht zijn op het manipuleren van concrete materialen (bijvoorbeeld steen). Bijgevolg zijn (enkel) professies beroepen met een morele identiteit. In alle zelfdefinities van sociaal werk is deze morele identiteit, deze humanitaire kern aanwezig (zie bv. IFSW, NVMW). Daarom moet sociaal werk worden beschouwd als een professie en niet als een ambacht. Dit is niet louter een academische discussie maar beïnvloedt bijvoorbeeld de positie van dit beroep in de samenleving, zoals aan de hand van de ministeriële richtlijnen betreffende Welzijn Nieuwe Stijl kan worden geïllustreerd.
DOCUMENT
From the article: This paper describes the external IT security analysis of an international corporate organization, containing a technical and a social perspective, resulting in a proposed repeatable approach and lessons learned for applying this approach. Part of the security analysis was the utilization of a social engineering experiment, as this could be used to discover employee related risks. This approach was based on multiple signals that indicated a low IT security awareness level among employees as well as the results of a preliminary technical analysis. To carry out the social engineering experiment, two techniques were used. The first technique was to send phishing emails to both the system administrators and other employees of the company. The second technique comprised the infiltration of the office itself to test the physical security, after which two probes were left behind. The social engineering experiment proved that general IT security awareness among employees was very low. The results allowed the research team to infiltrate the network and have the possibility to disable or hamper crucial processes. Social engineering experiments can play an important role in conducting security analyses, by showing security vulnerabilities and raising awareness within a company. Therefore, further research should focus on the standardization of social engineering experiments to be used in security analyses and further development of the approach itself. This paper provides a detailed description of the used methods and the reasoning behind them as a stepping stone for future research on this subject. van Liempd, D., Sjouw, A., Smakman, M., & Smit, K. (2019). Social Engineering As An Approach For Probing Organizations To Improve It Security: A Case Study At A Large International Firm In The Transport Industry. 119-126. https://doi.org/10.33965/es2019_201904l015
MULTIFILE