Dienst van SURF
© 2025 SURF
Currently, promising new tools are under development that will enable crime scene investigators to analyze fingerprints or DNA-traces at the crime scene. While these technologies could help to find a perpetrator early in the investigation, they may also strengthen confirmation bias when an incorrect scenario directs the investigation this early. In this study, 40 experienced Crime scene investigators (CSIs) investigated a mock crime scene to study the influence of rapid identification technologies on the investigation. This initial study shows that receiving identification information during the investigation results in more accurate scenarios. CSIs in general are not as much reconstructing the event that took place, but rather have a “who done it routine.” Their focus is on finding perpetrator traces with the risk of missing important information at the start of the investigation. Furthermore, identification information was mostly integrated in their final scenarios when the results of the analysis matched their expectations. CSIs have the tendency to look for confirmation, but the technology has no influence on this tendency. CSIs should be made aware of the risks of this strategy as important offender information could be missed or innocent people could be wrongfully accused.
The central aim of this dissertation is to increase our understanding of changes in identifications and in the professional identity of employees, by investigating the prominent foci of identification, their mix in higher-order social identities and the personal and organisational factors (HRM and supervisory behaviour) that are involved in the change of these professional self definitions. Building upon the assumption that institutions for Higher Education and their workforce are being continually challenged to keep up and adapt to changing societal demands and that it is the quality and flexibility of the workforce which is the key factor to address this turmoil, this dissertation specifically focuses on the understanding of changes in teachers’ professional identity in higher vocational education. For this purpose four related empirical studies have been conducted. Together these studies illustrate the considerable professional diversity in the workforce and shed light on the relationships between foci of identification and professional identities, performance appraisal, leadership, career competencies, customization strategies, professional development and changes in teachers’ identifications over time.
Specific approaches are needed to reach and support people with a lower socioeconomic position (SEP) to achieve healthier eating behaviours. There is a growing body of evidence suggesting that digital health tools exhibit potential to address these needs because of its specific features that enable application of various behaviour change techniques (BCTs). The aim of this scoping review is to identify the BCTs that are used in diet-related digital interventions targeted at people with a low SEP, and which of these BCTs coincide with improved eating behaviour. The systematic search was performed in 3 databases, using terms related to e/m-health, diet quality and socioeconomic position. A total of 17 full text papers were included. The average number of BCTs per intervention was 6.9 (ranged 3–15). BCTs from the cluster ‘Goals and planning’ were applied most often (25x), followed by the clusters ‘Shaping knowledge’ (18x) and ‘Natural consequences’ (18x). Other frequently applied BCT clusters were ‘Feedback and monitoring’ (15x) and ‘Comparison of behaviour’ (13x). Whereas some BCTs were frequently applied, such as goal setting, others were rarely used, such as social support. Most studies (n = 13) observed a positive effect of the intervention on eating behaviour (e.g. having breakfast) in the low SEP group, but this was not clearly associated with the number or type of applied BCTs. In conclusion, more intervention studies focused on people with a low SEP are needed to draw firm conclusions as to which BCTs are effective in improving their diet quality. Also, further research should investigate combinations of BCTs, the intervention design and context, and the use of multicomponent approaches. We encourage intervention developers and researchers to describe interventions more thoroughly, following the systematics of a behaviour change taxonomy, and to select BCTs knowingly.
This project addresses the fundamental societal problem that encryption as a technique is available since decades, but has never been widely adopted, mostly because it is too difficult or cumbersome to use for the public at large. PGP illustrates this point well: it is difficult to set-up and use, mainly because of challenges in cryptographic key management. At the same time, the need for encryption has only been growing over the years, and has become an urgent problem with stringent requirements – for instance for electronic communication between doctors and patients – in the General Data Protection Regulation (GDPR) and with systematic mass surveillance activities of internationally operating intelligence agencies. The interdisciplinary project "Encryption for all" addresses this fundamental problem via a combination of cryptographic design and user experience design. On the cryptographic side it develops identity-based and attribute-based encryption on top of the attribute-based infrastructure provided by the existing IRMA-identity platform. Identity-based encryption (IBE) is a scientifically well-established technique, which addresses the key management problem in an elegant manner, but IBE has found limited application so far. In this project it will be developed to a practically usable level, exploiting the existing IRMA platform for identification and retrieval of private keys. Attribute-based encryption (ABE) has not reached the same level of maturity yet as IBE, and will be a topic of further research in this project, since it opens up attractive new applications: like a teacher encrypting for her students only, or a company encrypting for all employees with a certain role in the company. On the user experience design side, efforts will be focused on making these encryption techniques really usable (i.e., easy to use, effective, efficient, error resistant) for everyone (e.g., also for people with disabilities or limited digital skills). To do so, an iterative, human-centred and inclusive design approach will be adopted. On a fundamental level, scientific questions will be addressed, such as how to promote the use of security and privacy-enhancing technologies through design, and whether and how usability and accessibility affect the acceptance and use of encryption tools. Here, theories of nudging and boosting and the unified theory of technology acceptance and use (known as UTAUT) will serve as a theoretical basis. On a more applied level, standards like ISO 9241-11 on usability and ISO 9241-220 on the human-centred design process will serve as a guideline. Amongst others, interface designs will be developed and focus groups, participatory design sessions, expert reviews and usability evaluations with potential users of various ages and backgrounds will be conducted, in a user experience and observation laboratory available at HAN University of Applied Sciences. In addition to meeting usability goals, ensuring that the developed encryption techniques also meet national and international accessibility standards will be a particular point of focus. With respect to usability and accessibility, the project will build on the (limited) usability design experiences with the mobile IRMA application.