Dienst van SURF
© 2025 SURF
This report describes the creation and use of a database for energy storage technologies which was developed in conjunction with Netbeheer Nederland and the Hanze University of Applied Sciences. This database can be used to make comparisons between a selection of storage technologies and will provide a method for ranking energy storage technology suitability based on the desired application requirements. In addition, this document describes the creation of the energy storage label which contains detailed characteristics for specific storage systems. The layout of the storage labels enables the analysis of different storage technologies in a comprehensive, understandable and comparative manner. A sampling of storage technology labels are stored in an excel spreadsheet and are also compiled in Appendix I of this report; the storage technologies represented here were found to be well suited to enable flexibility in energy supply and to potentially provide support for renewable energy integration [37] [36]. The data in the labels is presented on a series of graphs to allow comparisons of the technologies. Finally, the use and limitations of energy storage technologies are discussed. The results of this research can be used to support the Dutch enewable Energy Transition by providing important information regarding energy storage in both technically detailed and general terms. This information can be useful for energy market parties in order to analyze the role of storage in future energy scenarios and to develop appropriate strategies to ensure energy supply.
MULTIFILE
The central thesis of this book is that access to information represents a vital aspect of contemporary society, encompassing participation, accountability, governance, transparency, the production of products, and the delivery of services. This view is widely shared, with commentators and scholars agreeing that access to information is a key factor in maintaining societal and economic stability. However, having access to information does not guarantee its accessibility. Assuming that information is (cognitively) interpretable is incorrect, as many practical examples illustrate. In the first chapter, this book offers insights into the challenge of access to information in a digitalized world. The concepts of access and accessibility are addressed, elucidating their meanings and delineating the ways in which they are influenced by the exponential growth of information. It examines how information technology introduces a novel access paradox. The second chapter examines the challenges to access to and accessibility of information in a digitalized, hybrid world where code may be law, where there is an inescapable loss of privacy, where doing business opens and restricts access, where literacy is a necessity to survive ‘digital divides,’ and where environmental concerns may have an adverse effect on high expectations. The third chapter presents a review of theoretical approaches to access and accessibility from seven different research perspectives: information access disparity, information seeking, information retrieval, information quality, information security, information management, and archives management. Six approaches to information access and accessibility are identified: [1] social, economic, and political participation; [2] ‘smart’ and evolving technology; [3] power and control; [4] sense-making; [5] knowledge representations, and [6] information survival. The fourth chapter addresses the bottlenecks and requirements for information access and accessibility, culminating in a checklist for organizations to assess these requirements within their own business processes. In the fifth chapter, some perspectives on artificial intelligence and the future of information access are presented. The sixth chapter represents an attempt to draw conclusions and to bring this book to a close.
In this paper we explore the extent to which privacy enhancing technologies (PETs) could be effective in providing privacy to citizens. Rapid development of ubiquitous computing and ‘the internet of things’ are leading to Big Data and the application of Predictive Analytics, effectively merging the real world with cyberspace. The power of information technology is increasingly used to provide personalised services to citizens, leading to the availability of huge amounts of sensitive data about individuals, with potential and actual privacy-eroding effects. To protect the private sphere, deemed essential in a state of law, information and communication systems (ICTs) should meet the requirements laid down in numerous privacy regulations. Sensitive personal information may be captured by organizations, provided that the person providing the information consents to the information being gathered, and may only be used for the express purpose the information was gathered for. Any other use of information about persons without their consent is prohibited by law; notwithstanding legal exceptions. If regulations are properly translated into written code, they will be part of the outcomes of an ICT, and that ICT will therefore be privacy compliant. We conclude that privacy compliance in the ‘technological’ sense cannot meet citizens’ concerns completely, and should therefore be augmented by a conceptual model to make privacy impact assessments at the level of citizens’ lives possible.