Service of SURF
© 2025 SURF
This dissertation describes a research project about the communication between communication vulnerable people and health care professionals in long-term care settings. Communication vulnerable people experience functional communication difficulties in particular situations, due to medical conditions. They experience difficulties expressing themselves or understanding professionals, and/or professionals experience difficulties understanding these clients. Dialogue conversations between clients and professionals in healthcare, which for example concern health-related goals, activity and participation choices, diagnostics, treatment options, and treatment evaluation, are, however, crucial for successful client-centred care and shared decision making. Dialogue conversations facilitate essential exchanges between clients and healthcare professionals, and both clients and professionals should play a significant role in the conversation. It is unknown how communication vulnerable people and their healthcare professionals experience dialogue conversations and what can be done to support successful communication in these conversations. The aim of this research is to explore how communication vulnerable clients and professionals experience their communication in dialogue conversations in long-term care and how they can best be supported in improving their communication in these conversations.
This article examines the network structure, criminal cooperation, and external interactions of cybercriminal networks. Its contribution is empirical and inductive. The core of this study involved carrying out 10 case analyses on closed cybercrime investigations – all with financial motivations on the part of the offenders - in the UK and beyond. Each analysis involved investigator interview and access to unpublished law enforcement files. The comparison of these cases resulted in a wide range of findings on these cybercriminal networks, including: a common division between the scam/attack components and the money components; the presence of offline/local elements; a broad, and sometimes blurred, spectrum of cybercriminal behaviour and organisation. An overarching theme across the cases that we observe is that cybercriminal business models are relatively stable.
The dark web is creating difficulties for traditional policing. Previous studies have focused on users, but very little is known about law enforcement dealing with the core challenge of Anonymity Communication Networks: absent and anonymous suspects whose locations and identities are effectively hidden behind encryption. Based on 14 interviews with Dutch police officers and public prosecutors, enriched with a media analysis of 45 Dutch newspaper articles, we come to a model of Dutch law enforcement dealing with Tor cases. We observe that the police are adapting to the new reality of Tor use. However, they still work within their set framework which does not always match the needs for policing Tor cases. We additionally note a more prominent place for the strategy of disruption which may create the need for additional legal grounds.