Not much is known about the etiology, or development, of deviant sexual interests. The aim of this systematic review was to provide a broad overview of current theories on the etiology of sexual deviance. We conducted a systematic search of the databases PubMed and APA PsycInfo (EBSCO). Studies were included when they discussed a theory regarding the etiology or development of sexual deviance. Included studies were assessed on quality criteria for good theories. Common etiological themes were extracted using thematic analysis. We included 47 theories explaining sexual deviance in general as well as various specific deviant sexual interests, such as pedophilia and sadism/masochism. Few theories (k = 7) were of acceptable quality as suggested by our systematic assessment of quality criteria for good theories (QUACGOT). These theories indicated that deviant sexual interests may develop as the result of an interplay of various factors: excitation transfer between emotions and sexual arousal, conditioning, problems with “normative” sexuality, and social learning. Neurobiological findings could not be included as no acceptable quality neurobiological theories could be retrieved. The important roles of excitation transfer and conditioning designate that dynamic, changeable processes take part in the etiology of sexual deviance. These same processes could potentially be deployed to diminish unwanted deviant sexual interests.
The aim of this systematic review was to examine the association between malnutrition and oral health in older people (≥ 60 years of age). A comprehensive systematic literature search was performed in four databases (PubMed, CINAHL, Dentistry and Oral Sciences Source, and Embase) for literature from January 2000 to May 2020. Both observational and intervention studies were screened for eligibility. Two reviewers independently screened the search results to identify potential eligible studies, and assessed the methodological quality of the full-text studies. A total of 3240 potential studies were identified. After judgement for relevance, 10 studies (cross-sectional (n = 9), prospective cohort (n = 1)) met the inclusion criteria. Three studies described malnourished participants as having fewer teeth, or functional (tooth) units (FTUs), compared to well-nourished participants. Four studies reported soft tissue problems in malnourished participants, including red tongue with blisters, and dry or cracked lips. Subjective oral health was the topic in six studies, with poorer oral health and negative self-perception of oral health in malnourished elderly participants. There are associations between (at risk of) malnutrition and oral health in older people, categorized in hard and soft tissue conditions of the mouth, and subjective oral health. Future research should be focused on longitudinal cohort studies with proper determination of malnutrition and oral health assessments, in order to evaluate the actual association between malnutrition and oral health in older people.
Healthcare organizations collaborate, share knowledge, and need to be accountable to each other. Therefore, healthcare organizations manage a dynamic information system landscape. Enterprise Architecture (EA) is a management tool for aligning these landscapes to the primary information needs that healthcare organizations have. EA is of value in some environments, but it seems to be not well suited to the dynamics of healthcare. Despite the publication of several systematic literature reviews on EA in healthcare, a systematic literature study comparing EA applicability at various levels of cooperation (intra, inter, and network collaboration) is lacking. Therefore, we posed the following research question: To what extent is EA researched within healthcare organizations in the context of intra, inter and network collaboration? A systematic literature review was used to select 94 scientific publications for evaluation. These studies make explicit the EA elements at three levels of collaboration in the context of healthcare. The findings show that EA is most frequently studied in relation to a single healthcare organization with a wide range of topics. IT governance and EA implementation are the subjects of the majority of EA network level studies (17 out of 94 studies), followed by building/developing EA, EA acceptance, EA issues and root causes, and EA modeling. Although numerous EA frameworks are discussed in studies at the intra- and interorganizational levels, they are rarely referenced in studies at the network level. Additionally, the EA benefits, success factors, and challenges are comparable at high level, but details differ per level. These findings demonstrate that EA is researched within the healthcare sector context. The majority of knowledge on EA is focused on a single healthcare organization, but little is known about EA in a networked healthcare environment. To learn more about how EA might be used in a healthcare network setting, a research agenda has been set up based on the results.
LINK
The research proposal aims to improve the design and verification process for coastal protection works. With global sea levels rising, the Netherlands, in particular, faces the challenge of protecting its coastline from potential flooding. Four strategies for coastal protection are recognized: protection-closed (dikes, dams, dunes), protection-open (storm surge barriers), advancing the coastline (beach suppletion, reclamation), and accommodation through "living with water" concepts. The construction process of coastal protection works involves collaboration between the client and contractors. Different roles, such as project management, project control, stakeholder management, technical management, and contract management, work together to ensure the project's success. The design and verification process is crucial in coastal protection projects. The contract may include functional requirements or detailed design specifications. Design drawings with tolerances are created before construction begins. During construction and final verification, the design is measured using survey data. The accuracy of the measurement techniques used can impact the construction process and may lead to contractual issues if not properly planned. The problem addressed in the research proposal is the lack of a comprehensive and consistent process for defining and verifying design specifications in coastal protection projects. Existing documents focus on specific aspects of the process but do not provide a holistic approach. The research aims to improve the definition and verification of design specifications through a systematic review of contractual parameters and survey methods. It seeks to reduce potential claims, improve safety, enhance the competitiveness of maritime construction companies, and decrease time spent on contractual discussions. The research will have several outcomes, including a body of knowledge describing existing and best practices, a set of best practices and recommendations for verifying specific design parameters, and supporting documents such as algorithms for verification.
In dit onderzoek brachten we actuele kennis in kaart over effectief reclasseringstoezicht.Doel Doel van het project was om een systematisch overzicht te maken van werkzame elementen voor reclasseringstoezicht. Dit zijn elementen die aantoonbaar bijdragen aan het verminderen van recidive, voorkomen van uitval, versterken van motivatie voor verandering en verbeteren van het functioneren van delinquenten op verschillende leefgebieden. Resultaten Een onderzoeksrapportage met een overzicht van werkzame elementen voor reclasseringstoezicht. Een Engelse versie van de onderzoeksrapportage: Effective practices in probation supervision: a systematic literature review. Een publieksversie van het onderzoeksrapport waarin de belangrijkste bevindingen zijn samengevat. Een artikel voor een wetenschappelijk tijdschrift (in ontwikkeling). Looptijd 01 oktober 2019 - 31 augustus 2020 Aanpak Er is in de afgelopen jaren veel onderzoek gedaan naar reclasseringstoezicht, in Nederland maar vooral ook in het buitenland. Onderzoekers voerden een systematisch literatuuronderzoek uit van de nationale en internationale onderzoeksliteratuur over reclasseringstoezicht vanaf het jaar 2000 en beoordeelden hoe onderbouwd de conclusies zijn. Relevantie voor werkveld en onderwijs Het overzicht van bewezen werkzame elementen voor toezicht op delinquenten is bijzonder nuttig, voor het werkveld en voor hbo-opleidingen die toekomstige forensisch sociale professionals opleiden. Het kan richting geven aan deskundigheidsbevordering, aan beleidsontwikkeling van de reclassering, en ondersteunt keuzes die reclasseringswerkers dagelijks moeten maken in hun begeleidingscontacten met reclasseringscliënten.
This project addresses the fundamental societal problem that encryption as a technique is available since decades, but has never been widely adopted, mostly because it is too difficult or cumbersome to use for the public at large. PGP illustrates this point well: it is difficult to set-up and use, mainly because of challenges in cryptographic key management. At the same time, the need for encryption has only been growing over the years, and has become an urgent problem with stringent requirements – for instance for electronic communication between doctors and patients – in the General Data Protection Regulation (GDPR) and with systematic mass surveillance activities of internationally operating intelligence agencies. The interdisciplinary project "Encryption for all" addresses this fundamental problem via a combination of cryptographic design and user experience design. On the cryptographic side it develops identity-based and attribute-based encryption on top of the attribute-based infrastructure provided by the existing IRMA-identity platform. Identity-based encryption (IBE) is a scientifically well-established technique, which addresses the key management problem in an elegant manner, but IBE has found limited application so far. In this project it will be developed to a practically usable level, exploiting the existing IRMA platform for identification and retrieval of private keys. Attribute-based encryption (ABE) has not reached the same level of maturity yet as IBE, and will be a topic of further research in this project, since it opens up attractive new applications: like a teacher encrypting for her students only, or a company encrypting for all employees with a certain role in the company. On the user experience design side, efforts will be focused on making these encryption techniques really usable (i.e., easy to use, effective, efficient, error resistant) for everyone (e.g., also for people with disabilities or limited digital skills). To do so, an iterative, human-centred and inclusive design approach will be adopted. On a fundamental level, scientific questions will be addressed, such as how to promote the use of security and privacy-enhancing technologies through design, and whether and how usability and accessibility affect the acceptance and use of encryption tools. Here, theories of nudging and boosting and the unified theory of technology acceptance and use (known as UTAUT) will serve as a theoretical basis. On a more applied level, standards like ISO 9241-11 on usability and ISO 9241-220 on the human-centred design process will serve as a guideline. Amongst others, interface designs will be developed and focus groups, participatory design sessions, expert reviews and usability evaluations with potential users of various ages and backgrounds will be conducted, in a user experience and observation laboratory available at HAN University of Applied Sciences. In addition to meeting usability goals, ensuring that the developed encryption techniques also meet national and international accessibility standards will be a particular point of focus. With respect to usability and accessibility, the project will build on the (limited) usability design experiences with the mobile IRMA application.