Praktische toepassingen van FinTech (FinTech=de digitale transformatie van, met name, de financieel-zakelijke dienstverlening)
LINK
Het huidige wetsvoorstel inzake de km-heffing is uiterst oneerlijk, lost de files niet op en maakt het voor de maatschappij als geheel slechts complexer, intransparanter en veel duurder. Overheveling van de bpm naar de algemene lasten ("bereikbaarheidsheffing"), afschaffing van het kentekenonderscheid en overheveling van de houderschapsbelasting naar de accijnzen kunnen zonder noemenswaardige kosten worden doorgevoerd en zijn veel eerlijker dan de km-heffing.
DOCUMENT
The finding of poor lighting conditions in nursing homes in combination with a high prevalence of visual problems (with cataract found to be the most common age related pathology), stretches the need of enhanced awareness of eye care by professional caregivers.
DOCUMENT
Copyright enforcement by private third parties – does it work uniformly across the EU? Since the inception of Napster, home copying of digital files has taken a flight. The first providers of software or infrastructure for the illegal exchange of files were held contributory or vicariously liable for copyright infringement. In response, they quickly diluted the chain of liability to such an extent that neither the software producers, nor the service providers could be held liable. Moving further down the communication chain, the rights holders are now requiring Internet Service Providers (ISPs) that provide access to end customers to help them with the enforcement of their rights. This article discusses case-law regarding the enforcement of copyright by Internet Access Providers throughout Europe. At first glance, copyright enforcement has been harmonised by means of a number of directives, and article 8(3) of the Copyright Directive (2001/29/EC) regulates that EU Member States must ensure the position of rights holders with regard to injunctions against ISPs. Problem solved? Case law from Denmark, Ireland, Belgium, Norway, England, The Netherlands, Austria and the Court of Justice of the EU was studied. In addition, the legal practice in Germany was examined. The period of time covered by case law is from 2003 to 2013, the case law gives insight into the differences that still exist after the implementation of the directive.
DOCUMENT
Onderzoeksrapport over leidinggeven aan interdisciplinair beta technisch hoger onderwijs (context Smart Solutions Semester). https://www.techyourfuture.nl/files/downloads/Eindrapport_TYF_Leiderschap_-_okt_2019_DEF.pdf
MULTIFILE
TitleDefining Student Success as a Multidimensional Concept: a Scoping Review (additional files)DescriptionStudent success is a critically important concept in educational assessment and research. Yet, a universal definition of the concept has not been established. A comprehensive scoping review was conducted to define student success and take inventory of associated factors. This page contains files pertaining to the publication that presents the findings.
LINK
Currently, 4% of older adults reside in long-term care facilities in the Netherlands. Nursing home residents tend to have multimorbidity that is associated with considerable disabilities and a high level of care dependency. In the Dutch adult population the highest estimated prevalence (>40%) of visual impairment (low vision and blindness) was found in the subgroup of residents in nursing homes (NHs). The aim of this study is to describe the current practice of eye care by Dutch nursing home physicians (NHPs). A digital online survey was developed to describe the eye care activities of nursing home physicians and their cooperation in this perspective with other professionals. Of 1573 NHPs present in the Netherlands, 125 (8%) responded. Results show that more than 50% of the NHPs regularly examine ‘distant vision’, ‘near vision’ and ‘the visual field’ . However, 23%, 33% and 45% almost never or never examine the ‘visual field’, ‘near vision’ and ‘distant vision’, respectively. Data regarding eye care, regularly recorded in the client files by more than 50% of the NHPs, are medical data involving ‘use of eye medication’, ‘eye disease’, and ‘eye surgery in the past’. Less commonly recorded is ‘the use of reading glasses’ as well as ‘eye pain’. Inside of the NH, (head) nurses and ward nurses (chi 2 = 309, df = 5, p = 0.000), and outside of the NH, ophthalmologists and low vision specialists are most frequently contacted about eye related issues (chi 2 = 224, df = 4, p = 0.000). Opticians are rarely contacted, and optometrists and orthoptists are ‘never’ contacted by more than 50% of the NHPs. Moreover, 50% of the NHPs noted that collaboration with external eye care professionals is ‘not structural’. This study shows that, according to NHPs, relevant visual aspects are not structurally examined and recorded in the client files. Outside of the NH, NHPs tend to have a less frequent collaborative relationship with optometrists, orthoptists and opticians compared to ophthalmologists and low vision specialists. The NHP’s role in providing eye care can be improved by development of guidelines for structural eye screening, improvement of recording in client files, and exploring plus undertaking collaboration with other eye care professionals.
LINK
Many quality aspects of software systems are addressed in the existing literature on software architecture patterns. But the aspect of system administration seems to be a bit overlooked, even though it is an important aspect too. In this work we present three software architecture patterns that, when applied by software architects, support the work of system administrators: PROVIDE AN ADMINISTRATION API, SINGLE FILE LOCATION, and CENTRALIZED SYSTEM LOGGING. PROVIDE AN ADMINISTRATION API should solve problems encountered when trying to automate administration tasks. The SINGLE FILE LOCATION pattern should help system administrators to find the files of an application in one (hierarchical) place. CENTRALIZED SYSTEM LOGGING is useful to prevent coming up with several logging formats and locations. Abstract provided by the authors. Published in PLoP '13: Proceedings of the 20th Conference on Pattern Languages of Programs ACM.
DOCUMENT
Objective: To evaluate the delivery, acceptance and experiences regarding a traditional and teletreatment approach to mirror therapy as delivered in a randomized controlled trial. Design: Mixed methods, prospective study. Setting: Rehabilitation centres, hospital and private practices. Subjects: Adult patients with phantom pain following lower limb amputation and their treating physical and occupational therapists. Interventions: All patients received 4 weeks of traditional mirror therapy (n=51), followed by 6 weeks of teletreatment (n=26) or 6 weeks of self-delivered mirror therapy (n=25). Main measures: Patient files, therapist logs, log files teletreatment, acceptance questionnaire and interviews with patients and their therapists. Results: In all, 51 patients and 10 therapists participated in the process evaluation. Only 16 patients (31%) received traditional mirror therapy according to the clinical framework during the first 4 weeks. Between weeks 5 and 10, the teletreatment was used by 14 patients (56%) with sufficient dose. Teletreatment usage decreased from a median number of 31 (weeks 5–10) to 19 sessions (weeks 11–24). Satisfactory teletreatment user acceptance rates were found with patients demonstrating higher scores (e.g. regarding the usefulness to control pain) than therapists. Potential barriers for implementation of the teletreatment perceived by patients and therapists were related to insufficient training and support as well as the frequency of technical problems. Conclusion: Traditional mirror therapy and the teletreatment were not delivered as intended in the majority of patients. Implementation of the teletreatment in daily routines was challenging, and more research is needed to evaluate user characteristics that influence adherence and how technology features can be optimized to develop tailored implementation strategies.
DOCUMENT
This article examines the network structure, criminal cooperation, and external interactions of cybercriminal networks. Its contribution is empirical and inductive. The core of this study involved carrying out 10 case analyses on closed cybercrime investigations – all with financial motivations on the part of the offenders - in the UK and beyond. Each analysis involved investigator interview and access to unpublished law enforcement files. The comparison of these cases resulted in a wide range of findings on these cybercriminal networks, including: a common division between the scam/attack components and the money components; the presence of offline/local elements; a broad, and sometimes blurred, spectrum of cybercriminal behaviour and organisation. An overarching theme across the cases that we observe is that cybercriminal business models are relatively stable.
DOCUMENT