The Research Group for Governmental Communication has carried out a trend study of governmental communication within The Netherlands (1). Research topics were: the major tasks for communication, current issues, profiling the communication department, and policy plans for communication. Another study focused on quality control as a management function for the communication department (2). A tool was developed to measure the communication quality of governmental organisations. Looking back on the results of both studies we asked ourselves the question: How can the academic field pursue the research of communication practice in governmental organisations and then support this field with results? The article focuses on governmental communication in The Netherlands, but the results might also be interesting for researchers and communication experts in governmental communication in other countries. The author argues that the priorities in the research agenda within the field of governmental communication should include: monitoring methods, quality control and accountability.
In this article, we call for a critical reflection on the lens that we adopt when researching journalism and communication. Adopting a lens of wonder can enhance our ability to consider the rich diversity that can be found in the field. Through a variety of research projects, we show how through wonder we cannot only understand how journalism is becoming but also make space for “becoming with”: we show how we are complicit in journalism’s future. Focusing on the paradoxical nature of journalistic practices as something we learned from our work with journalists, we illuminate and open up the much-at-onceness of journalistic life.
Intention of healthcare providers to use video-communication in terminal care: a cross-sectional study. Richard M. H. Evering, Marloes G. Postel, Harmieke van Os-Medendorp, Marloes Bults and Marjolein E. M. den Ouden BMC Palliative Care volume 21, Article number: 213 (2022) Cite this articleAbstractBackgroundInterdisciplinary collaboration between healthcare providers with regard to consultation, transfer and advice in terminal care is both important and challenging. The use of video communication in terminal care is low while in first-line healthcare it has the potential to improve quality of care, as it allows healthcare providers to assess the clinical situation in real time and determine collectively what care is needed. The aim of the present study is to explore the intention to use video communication by healthcare providers in interprofessional terminal care and predictors herein.MethodsIn this cross-sectional study, an online survey was used to explore the intention to use video communication. The survey was sent to first-line healthcare providers involved in terminal care (at home, in hospices and/ or nursing homes) and consisted of 39 questions regarding demographics, experience with video communication and constructs of intention to use (i.e. Outcome expectancy, Effort expectancy, Attitude, Social influence, Facilitating conditions, Anxiety, Self-efficacy and Personal innovativeness) based on the Unified Theory of Acceptance and Use of Technology and Diffusion of Innovation Theory. Descriptive statistics were used to analyze demographics and experiences with video communication. A multiple linear regression analysis was performed to give insight in the intention to use video communication and predictors herein.Results90 respondents were included in the analysis.65 (72%) respondents had experience with video communication within their profession, although only 15 respondents (17%) used it in terminal care. In general, healthcare providers intended to use video communication in terminal care (Mean (M) = 3.6; Standard Deviation (SD) = .88). The regression model was significant and explained 44% of the variance in intention to use video communication, with ‘Outcome expectancy’ and ‘Social influence’ as significant predictors.ConclusionsHealthcare providers have in general the intention to use video communication in interprofessional terminal care. However, their actual use in terminal care is low. ‘Outcome expectancy’ and ‘Social influence’ seem to be important predictors for intention to use video communication. This implicates the importance of informing healthcare providers, and their colleagues and significant others, about the usefulness and efficiency of video communication.
MULTIFILE
“Empowering learners to create a sustainable future” This is the mission of Centre of Expertise Mission-Zero at The Hague University of Applied Sciences (THUAS). The postdoc candidate will expand the existing knowledge on biomimicry, which she teaches and researches, as a strategy to fulfil the mission of Mission-Zero. We know when tackling a design challenge, teams have difficulties sifting through the mass of information they encounter. The candidate aims to recognize the value of systematic biomimicry, leading the way towards the ecosystems services we need tomorrow (Pedersen Zari, 2017). Globally, biomimicry demonstrates strategies contributing to solving global challenges such as Urban Heat Islands (UHI) and human interferences, rethinking how climate and circular challenges are approached. Examples like Eastgate building (Pearce, 2016) have demonstrated successes in the field. While biomimicry offers guidelines and methodology, there is insufficient research on complex problem solving that systems-thinking requires. Our research question: Which factors are needed to help (novice) professionals initiate systems-thinking methods as part of their strategy? A solution should enable them to approach challenges in a systems-thinking manner just like nature does, to regenerate and resume projects. Our focus lies with challenges in two industries with many unsustainable practices and where a sizeable impact is possible: the built environment (Circularity Gap, 2021) and fashion (Joung, 2014). Mission Zero has identified a high demand for Biomimicry in these industries. This critical approach: 1) studies existing biomimetic tools, testing and defining gaps; 2) identifies needs of educators and professionals during and after an inter-disciplinary minor at The Hague University; and, 3) translates findings into shareable best practices through publications of results. Findings will be implemented into tangible engaging tools for educational and professional settings. Knowledge will be inclusive and disseminated to large audiences by focusing on communication through social media and intervention conferences.
The Academy for Leisure & Events has always been one of the frontrunners when it comes to the development, design and implementation of cultural tourism and creative industry business models as well as lifelong learning programmes.These programmes are attended by a variety of leisure and tourism professionals, including public authorities in leisure, culture and nature fields.The CULTURWB project addresses the need for strengthening the development of the cultural tourism industry.The experts from BUas together with the other project partners have utilised diverse research methodologies (marketing and branding, strategy business planning, digital tourism, sustainable development, strategy and action plan implementation, etc.) to develop and pilot a toolkit for Lifelong Learning courses in the field of cultural tourism and heritage. They have also designed and implemented a master’s programme in the WB countries and created an online platform for communication between stakeholders, industry leaders, managers, workforce, and academia.PartnersHochschule Heibronn, FH Joanneum Gesellschaft, World University Service - Österreichisches Komitee (WUS Austria), Dzemal Bijedic University of Mostar (UNMO), University of East Sarajevo (UES), The University of Banja Luka (UBL), University of NIS (UNI), University of Montenegro (UoM), Sarajevo Meeting of Cultures (SMOC), rovincial Institute for the Protection of Cultural Monuments (PZZZSK), Tourism Organisation of Kotor Municipality (TO Kotor)
Today, embedded devices such as banking/transportation cards, car keys, and mobile phones use cryptographic techniques to protect personal information and communication. Such devices are increasingly becoming the targets of attacks trying to capture the underlying secret information, e.g., cryptographic keys. Attacks not targeting the cryptographic algorithm but its implementation are especially devastating and the best-known examples are so-called side-channel and fault injection attacks. Such attacks, often jointly coined as physical (implementation) attacks, are difficult to preclude and if the key (or other data) is recovered the device is useless. To mitigate such attacks, security evaluators use the same techniques as attackers and look for possible weaknesses in order to “fix” them before deployment. Unfortunately, the attackers’ resourcefulness on the one hand and usually a short amount of time the security evaluators have (and human errors factor) on the other hand, makes this not a fair race. Consequently, researchers are looking into possible ways of making security evaluations more reliable and faster. To that end, machine learning techniques showed to be a viable candidate although the challenge is far from solved. Our project aims at the development of automatic frameworks able to assess various potential side-channel and fault injection threats coming from diverse sources. Such systems will enable security evaluators, and above all companies producing chips for security applications, an option to find the potential weaknesses early and to assess the trade-off between making the product more secure versus making the product more implementation-friendly. To this end, we plan to use machine learning techniques coupled with novel techniques not explored before for side-channel and fault analysis. In addition, we will design new techniques specially tailored to improve the performance of this evaluation process. Our research fills the gap between what is known in academia on physical attacks and what is needed in the industry to prevent such attacks. In the end, once our frameworks become operational, they could be also a useful tool for mitigating other types of threats like ransomware or rootkits.