Searched for: department:"Multi%5C+Actor%5C+Systems"
(1 - 20 of 380)

Pages

document
Niemann, Ludger (author), Hoppe, T. (author)
A growing number of city governments worldwide engage in sustainability reporting, voluntarily and responding to legal pressures. Diverse practices emerged based on unique choices concerning formats, periodicity, authorship and dissemination efforts. Such design questions and associated outcomes are highly relevant for practitioners yet...
journal article 2017
document
de Bruijn, J.A. (author), Janssen, M.F.W.H.A. (author)

Cybersecurity is a global phenomenon representing a complex socio-technical challenge for governments, but requiring the involvement of individuals. Although cybersecurity is one of the most important challenges faced by governments today, the visibility and public awareness remains limited. Almost everybody has heard of cybersecurity,...

journal article 2017
document
Kothuis, B.L.M. (author), Jonkman, S.N. (author), Sebastian, A. (author)
book chapter 2016
document
De Bruijn, J.A. (author)
How does Donald Trump frame his message? What are his followers hearing? Here are Donald Trump’s seven frames - and an explanation why these frames are so powerful.
journal article 2016
document
Eker, S. (author)
doctoral thesis 2016
document
Asghari, H. (author)
Research in the field of information security economics has clarified how attacker and defender incentives affect cybersecurity. It has also highlighted the role of intermediaries in strengthening cybersecurity. Intermediaries are organizations and firms that provide the Internet’s infrastructure and platforms. This dissertation looks at how...
doctoral thesis 2016
document
Levy, MC (author), Garcia, M (author), Blair, P (author), Chen, X (author), Gomes, S.L. (author), Gower, DB (author), Grames, J (author), Kuil, L (author), Liu, Y (author), Marston, L (author), McCord, PF (author), Roobavannan, M (author), Zeng, R (author)
journal article 2016
document
Kwakkel, J.H. (author), Haasnoot, M. (author)
journal article 2015
document
Singerling, T. (author), Klievink, A.J. (author), De Reuver, G.A. (author), Janssen, M.F.W.H.A. (author)
Organizations do not just decide on whether or not to exchange information digitally. In many cases, there are multiple alternative configurations of inter-organizational systems (IOS) that facilitate such information sharing. Although a lot is known about the factors that influence whether organizations do or do not adopt IOS, little is known...
conference paper 2015
document
Van de Velde, D.M. (author)
journal article 2015
document
Asghari, H. (author), Ciere, M. (author), Van Eeten, M.J.G. (author)
Research on botnet mitigation has focused predominantly on methods to technically disrupt the commandand-control infrastructure. Much less is known about the effectiveness of large-scale efforts to clean up infected machines. We analyze longitudinal data from the sinkhole of Conficker, one the largest botnets ever seen, to assess the impact of...
conference paper 2015
document
Thissen, W.A.H. (author), Kwakkel, J.H. (author), Mens, M. (author), Van der Sluijs, J. (author), Stemberger, S. (author), Wardekker, A. (author), Wildschut, D. (author)
Developing fresh water supply strategies for the long term needs to take into account the fact that the future is deeply uncertain. Not only the extent of climate change and the extent and nature of its impacts are unknown, also socio-economic conditions may change in unpredictable ways, as well as social preferences. Often, it is not possible...
journal article 2015
document
Datcu, D. (author), Lukosch, S.G. (author), Lukosch, H.K. (author), Cidota, M.A. (author)
The performance of operational teams in the security domain relies on quick and adequate exchange of context-related information. Currently, this information exchange is mainly based on oral communication. This paper reports on different scenarios from the security domain in which augmented reality (AR) techniques are used to support such...
journal article 2015
document
Eker, S. (author)
This documentation describes a system dynamics simulation model developed to be used in a policy analysis study for the Dutch gas sector. Focusing on uncertainties, an exploratory modeling approach is adopted in this study. This simulation model is used as a platform to generate internally consistent and plausible scenarios within the boundaries...
journal article 2015
document
Koç, Y. (author)
Current and future trends in environmental, economical, and human-caused factors (such as power demand growth, over-ageing of assets in power grids, and extreme weather conditions) challenge power grid robustness in the near future, necessitating research to better analyse and understand the notion of robustness in power grids, and ultimately to...
doctoral thesis 2015
document
Lukosch, S. (author), Billinghurst, M. (author), Alem, L. (author), Kiyokawa, K. (author)
Augmented Reality (AR) is a technology that allows users to view and interact in real time with virtual images seamlessly superimposed over the real world. AR systems can be used to create unique collaborative experiences. For example, co-located users can see shared 3D virtual objects that they interact with, or a user can annotate the live...
journal article 2015
document
Tambouris, E. (author), Scholl, H.J. (author), Janssen, M.F.W.H.A. (author), Wimmer, M.A. (author), Tarabanis, K. (author), Gascó, M. (author), Klievink, A.J. (author), Lindgren, I. (author), Milano, M. (author), Panagiotopoulos, P. (author), Pardo, T.A. (author), Parycek, P. (author), Sæbø, O. (author)
Electronic government and electronic participation continue to transform the public sector and society worldwide and are constantly being transformed themselves by emerging information and communication technologies. This book presents papers from the 14th International Federation for Information Processing’s EGOV conference (IFIP EGOV 2015),...
book 2015
document
Haasnoot, M. (author), Schellekens, J. (author), Beersma, J.J. (author), Middelkoop, H. (author), Kwadijk, J.C.J. (author)
Climate scenarios are used to explore impacts of possible future climates and to assess the robustness of adaptation actions across a range of futures. Time-dependent climate scenarios are commonly used in mitigation studies. However, despite the dynamic nature of adaptation, most scenarios for local or regional decision making on climate...
journal article 2015
document
Klievink, B. (author), Zomer, G. (author)
This paper is the introduction to the fourth Workshop on IT-enabled Resilient, Seamless and Secure Global Supply Chains (WITNESS 2015). In the paper, we present a synthesis of the innovation agendas of a series of international research, development and demonstration projects that seek to make supply chains more efficient and more secure. From...
conference paper 2015
document
Lukosch, S.G. (author), Lukosch, H.K. (author), Datcu, D. (author), Cidota, M.A. (author)
For operational units in the security domain that work together in teams, it is important to quickly and adequately exchange context-related information to ensure well-working collaboration. Currently, most information exchange is based on oral communication. This paper reports on different scenarios from the security domain in which augmented...
journal article 2015
Searched for: department:"Multi%5C+Actor%5C+Systems"
(1 - 20 of 380)

Pages