Jimmy Extreme
Graaf, J.W. (Jan Willem) de (Lector)
Verkenning best practices cybersecurity informatiedeling
Luuk Bekkers (Lid Lectoraat); Rick van der Kleij (Lid Lectoraat); E.R. (Rutger) Leukfeldt (Lector)
Simulating Small-Scale Agricultural Adaptation Decisions in Response to Drought Risk: An Empirical Agent-Based Model for Semi-Arid Kenya
Wens, Marthe; Veldkamp, Ted I. (Lectoraat Klimaatbestendige Stad); Mwangi, Moses; Johnson, J. Michael; Lasage, Ralph; Haer, Toon; Aerts, Jeroen C. J. H.
Towards applying design-thinking for designing privacy-protecting information systems
M.S. Bargh; R. Choenni
Performance voorspelling
Laura de Koning (Student); R. (Ruud) Vermeij
Why has the implementation of UNSCR 1325(2000) on taking a stand for Women, Peace, and Security by the Netherlands and Italy failed to provide the desired results?
Manon Wiersema (Student); M. (Mihaela) Anghel (Begeleider)
Country of Origin Criteria for Digitalization with National IT Products
Özdemir, Serkan; Mutlutürk, Meltem; Kör, Burcu (Amsib (Cedis)); Metin, Bilgin
Nulmeting
Raoul Notté (Lid Lectoraat); Lisanne Slot (Lid Lectoraat); Susanne van ‘t Hoff – de Goede, PhD (Onderzoeker); E.R. (Rutger) Leukfeldt (Lector)
Opening privacy sensitive microdata sets in light of GDPR: the case of opening criminal justice domain microdata
M.S. Bargh; R.F. Meijer; M. Vink; S.W. van den Braak; W. Schirm; R. Choenni
Gender-sensitive Violence Risk Assessment
Vivienne de Vogel (Lector); Mieke Bruggeman; Marike Lancel




























