This report consists of two parts and describes the highlights of the investigations carried out in the Province of Groningen as part of the Right Project to understand the Regional Innovation Ecosystem in the region. The first part is focusses on the socio-economic and R&D profile (Part 1A) and a SWOT analysis on salient aspects related to Regional Innovation Ecosystems (Part 1B). The second part (Part 2) focuses on the SME innovation capacity and needs, and presents the highlights of 6 interviews with SMEs in the region. The RIGHT project, an Interreg North Sea Program, will contribute to territorial growth in the North Sea Region by connecting smart specialisation strategies to human capital and the skills of the workforce by defining existing and potential regional growth sectors and sub-sectors.
LINK
The range of studies that has been conducted on the role of gossip in organizations suggests that gossip in the workplace plays a variety of important roles in organisational processes. However, relatively few studies have explored its role in intercultural situations. This is surprising given how organisations are becoming increasingly diverse. This paper addresses this gap in the literature. It reports on an exploratory project that sought to determine how perceptions of organisational gossip vary between members of different cultural groups. Using a sensemaking, interpretative approach, we showed two gossip scenarios to 8 Chinese, 8 German and 8 Dutch first year students, and conducted semi structured interviews, asking them how they perceived the nature of the gossip, the gossiper and the object of gossip (i.e., the person being gossiped about). After analysing the data with ATLAS.ti, we observed certain patterns emerging. For example, while all students condemned a manager’s bad behaviour, the Chinese students seemed to expect it more than did their Dutch or German counterparts. Moreover, we found that the relationship and amount of trust that exists between gossiper, listener and object of gossip greatly influenced how the gossiper and object of gossip were perceived. After reflecting on our research methodology, this study sets the stage for the next phase of our research on the role of gossip in intercultural situations. LinkedIn: https://www.linkedin.com/in/dominiquedarmon/
From the article: A process focus for project management education is suggested based on a small qualitative sample as an alternative to competence focus. Commercial offerings of project management education are more focused on processes than competences. Review of the courses reveals that there is almost no offering for alongside, medior or senior project managers and that the scarce competences incorporated in the courses do not match with findings from previous research. There are several strong suggestions of a very weak curriculum consistency, like universal application, a diverse target audience and a strong bias towards planning, supporting earlier critique on project management education.
Ten gevolge van de klimaatverandering Nederland bedreigt. De Verenigde Naties benoemt ‘17 Gobal Goals for a Sustainable Development’ nader gespecificeerd. Goal 13:” versterk de veerkracht en het aanpassingsvermogen aan klimaatgerelateerde gevaren en natuurrampen”. Deze klimaatverandering vraagt om een continue inzicht in de waterafvoercapaciteit van Nederlandse water-infrastructuur. Autonome vaartuigen maken een continue bemeting en realtime informatie van de vaarwegen mogelijk op basis waarvan waar snel actie ondernomen kan worden. Diverse partijen zowel publiek als privaat hebben de wens om continue en autonoom te varen en zijn afzonderlijk hiermee bezig zoals onder andere Rijkswaterstaat, Saeport Groningen en Provincie Overijssel . Het lectoraat mechatronica, dat succesvol onderzoek doet naar ‘autonome systemen in ongestructureerde omgevingen’ heeft veel kennis en ervaring op het gebied van grond (2D navigatie) en lucht robots (3D navigatie). Deze ontwikkelde technologieën zijn potentieel zeer geschikt voor navigatie op het water (2D, 2.5D) en onderwater (3D). Tijdens de vraaginventarisatie bleek er reeds veel interesse van partijen om kennis te delen en samen door te ontwikkelen. Er zijn semi-autonome vaartuigen beschikbaar hiervoor, maar bij de partijen ontbrak een totaal overzicht van de huidige stand van der technologie. Daarom wil het lectoraat Mechatronica samen met Marinminds, Aquatic Drones en DronExpert een onderzoek uitvoeren naar de ‘State of the Art’ betreft autonoom varen. In dit project zal dit onderzoek worden uitgevoerd door specificatie van de gewenste functionele bouwblokken (WP1), een state-of-the art van beschikbare technische oplossingen (WP2), een Gap-analysis tussen deze beide (WP3), verkennende experimenten hiernaar met behulp van een demonstrator (WP4) en een nieuwe specifiek gemaakte projectaanvraag (WP5). Dit cross-over project van de topsector HTSM/SmartIndustry met de topsector Water & Maritiem versterkt al direct de kennispositie van alle betrokken partijen, waardoor deze consortia sneller de vaarwegen klimaat-adaptief kunnen maken, zodat daarmee de Nederlandse (water) veiligheid beter wordt geborgd.
The maritime transport industry is facing a series of challenges due to the phasing out of fossil fuels and the challenges from decarbonization. The proposal of proper alternatives is not a straightforward process. While the current generation of ship design software offers results, there is a clear missed potential in new software technologies like machine learning and data science. This leads to the question: how can we use modern computational technologies like data analysis and machine learning to enhance the ship design process, considering the tools from the wider industry and the industry’s readiness to embrace new technologies and solutions? The obbjective of this PD project is to bridge the critical gap between the maritime industry's pressing need for innovative solutions for a more agile Ship Design Process; and the current limitations in software tools and methodologies available via the implementation into Ship Design specific software of the new generation of computational technologies available, as big data science and machine learning.
Today, embedded devices such as banking/transportation cards, car keys, and mobile phones use cryptographic techniques to protect personal information and communication. Such devices are increasingly becoming the targets of attacks trying to capture the underlying secret information, e.g., cryptographic keys. Attacks not targeting the cryptographic algorithm but its implementation are especially devastating and the best-known examples are so-called side-channel and fault injection attacks. Such attacks, often jointly coined as physical (implementation) attacks, are difficult to preclude and if the key (or other data) is recovered the device is useless. To mitigate such attacks, security evaluators use the same techniques as attackers and look for possible weaknesses in order to “fix” them before deployment. Unfortunately, the attackers’ resourcefulness on the one hand and usually a short amount of time the security evaluators have (and human errors factor) on the other hand, makes this not a fair race. Consequently, researchers are looking into possible ways of making security evaluations more reliable and faster. To that end, machine learning techniques showed to be a viable candidate although the challenge is far from solved. Our project aims at the development of automatic frameworks able to assess various potential side-channel and fault injection threats coming from diverse sources. Such systems will enable security evaluators, and above all companies producing chips for security applications, an option to find the potential weaknesses early and to assess the trade-off between making the product more secure versus making the product more implementation-friendly. To this end, we plan to use machine learning techniques coupled with novel techniques not explored before for side-channel and fault analysis. In addition, we will design new techniques specially tailored to improve the performance of this evaluation process. Our research fills the gap between what is known in academia on physical attacks and what is needed in the industry to prevent such attacks. In the end, once our frameworks become operational, they could be also a useful tool for mitigating other types of threats like ransomware or rootkits.