Personal Information Security Assistant (PISA)
|
|
- Antony Milton Garrett
- 8 years ago
- Views:
Transcription
1 Personal Information Security Assistant (PISA) Prof. Dr. Roel Wieringa Universiteit Twente 3 Juli 2013 Cybersecurity Veldraadpleging 1
2 Project goal To develop and field-test a tool that performs IT risk management for consumers Long-term, but applied cybersecurity research 3 Juli 2013 Cybersecurity Veldraadpleging 2
3 Project motivation End-users are the weakest link in IT security Easy prey for cyberattacks Easy resources (botnets) for cyberattacks Improvement in end-user security has potentially large rewards End-users can function as early adopters 3 Juli 2013 Cybersecurity Veldraadpleging 3
4 Tool architecture PISA Client End-user PISA Risk Repository PISA Assurance Provider IT Service IT Service Provider End-user: Consumer, independent entrepeneur, or employee IT service: An application, service or device IT service provider: The organization delivering the service 3 Juli 2013 Cybersecurity Veldraadpleging 4
5 Tool architecture PISA Client End-user PISA Risk Repository PISA Assurance Provider IT Service IT Service Provider Client collects data about IT services used by end-users Risk repository maintains data about risks of IT services Assurance provider answers questions about end-user s risk profile 3 Juli 2013 Cybersecurity Veldraadpleging 5
6 Three usage scenarios Independent components End user (e.g. an entrepeneur) manually configures and manages PISA client; Independent provider manages risk repository; Trusted third party manages assurance provider. Integrated scenario IT service provider (e.g. social network) integrates PISA components in its own IT service Enabled scenario IT service provider (e.g. a bank) integrates risk repository in its own service; PISA client is offered through a web interface to end-users; End user runs assurance provider on its own devices. 3 Juli 2013 Cybersecurity Veldraadpleging 6
7 Partners KPN SBIR project Personal trust Agent/Personal trust center. Protection of teleworkers. XS4all Field testing 3 Juli 2013 Cybersecurity Veldraadpleging 7
8 User group CSC (o.a. security consultancy) Complions (o.a. security consultancy) Intermedion (consultancy) IT United Cap Gemini (still need a bank) Two user group meetings per year Case study sites 3 Juli 2013 Cybersecurity Veldraadpleging 8
9 Research goal 1 Tool development (with KPN) Requirements (KPN, User group, current prototype) Development & test infrastructure (KPN) Initial design & prototype, test on small scale (UT, KPN, user group) Test security of PISA Second prototype, small field test (XS4all 30 subjects) Third prototype, large field test (XS4all, subjects) 3 Juli 2013 Cybersecurity Veldraadpleging 9
10 Research goal 2 Risk repository Develop a risk ontology Build initial risk repository (KPN, User group) Design and test ways to maintain risk repository 3 Juli 2013 Cybersecurity Veldraadpleging 10
11 Research goal 3 Design and test persuasive user interface Use risk visualization techniques Use persuasion techniques Use adaptation techniques 3 Juli 2013 Cybersecurity Veldraadpleging 11
12 Business models Different scenarios come with different business models Develop these models Follow up the project with valorisation 3 Juli 2013 Cybersecurity Veldraadpleging 12
13 Ervaringen bij projectvoorbereiding Match met KPN bij matchmaking bijeenkomst: Zelfde ideeën over IT beveiliging; persoonlijke match met Haydar Cimen (KPN) Echter: success rate 1:100? Champion in KPN KPN heeft een gerelateerd SBIR project met als doelgroep telewerkers; andere technologie. Koppeling LTR SBIR is toevallig; niet eisen in een call for proposals. Als hij er is, geeft hij veel meerwaarde; kruisbestuiving Motivatie KPN: Aanvulling eigen SBIR project; PISA output is mogelijk nuttig. Exposure van KPN aan interessante jonge mensen en ideeën Interessantere onderzoeks-werkomgeving voor KPN medewerkers; medewerkers uitdagen kennis op peil te houden. 3 Juli 2013 Cybersecurity Veldraadpleging 13
14 Thank you! 3 Juli 2013 Cybersecurity Veldraadpleging 14
Graphical User Interfaces. Prof. dr. Paul De Bra Technische Universiteit Eindhoven Universiteit Antwerpen. 2005/2006 Graphical User Interfaces 2
Graphical User Interfaces Prof. dr. Paul De Bra Technische Universiteit Eindhoven Universiteit Antwerpen 2005/2006 Graphical User Interfaces 2 Part 3: User Interface Evaluation Predictive evaluation, without
More information12/17/2012. Business Information Systems. Portbase. Critical Factors for ICT Success. Master Business Information Systems (BIS)
Master (BIS) Remco Dijkman Joris Penders 1 Portbase Information Office Rotterdam Harbor Passes on all information Additional services: brokering advanced planning macro-economic prediction 2 Copyright
More informationHow to manage Business Apps - Case for a Mobile Access Strategy -
How to manage Business Apps - Case for a Mobile Access Strategy - Hans Heising, Product Manager Gábor Vida, Manager Software Development RAM Mobile Data 2011 Content Introduction 2 Bring your own device
More informationMAYORGAME (BURGEMEESTERGAME)
GATE Pilot Safety MAYORGAME (BURGEMEESTERGAME) Twan Boerenkamp Who is it about? Local council Beleidsteam = GBT or Regional Beleidsteam = RBT Mayor = Chairman Advisors now = Voorlichting? Official context
More informationInformatiebeveiliging volgens ISO/IEC 27001:2013
Informatiebeveiliging volgens ISO/IEC 27001:2013 Dave Hagenaars, directeur BSI Group Nederland Copyright 2012 BSI. All rights reserved. Inhoud Wie zijn wij? Waarom informatiebeveiliging? Wat is de relevantie
More informationConstructief omgaan met conflicten
Authentic Leadership ent programme es, trainers and Constructief omgaan met conflicten s, trainers and to grow in their 16 ability maart to coach 2012 and mentor leaders, so they can ntial and values ging
More informationProject number Applicant Title Partners + Collaboration
Applicant Title Partners + Collaboration CYBSEC.12.001 Prof. dr. R.J. Wieringa Personal Information Security Assistant (PISA) CYBSEC.12.002 Prof. dr. ir. W.M.P. van Privacy Compliance and Enforcement der
More informationIBK Scholingsdag. Created with Haiku Deck, presentation software that's simple, beautiful and fun. page 1 of 44
page 1 of 44 page 2 of 44 page 7 of 44 page 8 of 44 page 9 of 44 page 10 of 44 Gratis studieboeken via Volkskrant.nl: Accountancy & Financieel management Accounting Carrière & Studieadvies Carrièremanagement
More informationOversight Management: een zinvolle aanvulling!
Oversight Management: een zinvolle aanvulling! Houfhoff Pension Fund Academy Christiaan Tromp info@fiduciaryservices.eu April 2012 1 Agenda The Fiduciary Management promise The evolution of Pension Fund
More informationMaximizer Synergy. info@adafi.be BE 0415.642.030. Houwaartstraat 200/1 BE 3270 Scherpenheuvel. Tel: +32 495 300612 Fax: +32 13 777372
Maximizer Synergy Adafi Software is een samenwerking gestart met Advoco Solutions, een Maximizer Business Partner uit Groot Brittannië. Advoco Solutions heeft een technologie ontwikkeld, genaamd Synergy,
More informationBehavior Change Support Systems for Privacy and Security
51 Third International Workshop on Behavior Change Support Systems (BCSS 2015) Behavior Change Support Systems for Privacy and Security Roeland H.P. Kegel and Roel J. Wieringa University of Twente, Enschede,
More informationISACA Roundtable. Cobit and Grab@Pizza 7 september 2015
1 ISACA Roundtable 7 september 2015 ISACA Roundtable Cobit and Grab@Pizza 7 september 2015 2015 KPN Corporate Market B.V. ISACA, is a registered trademark of the Information Systems Audit and Control Association
More informationOns privacybier. Derde privacycafé Data Protection Institute 13 januari 2016 Thomas More Mechelen 21/01/16
21/01/16 Derde privacycafé Data Protection Institute 13 januari 2016 Thomas More Mechelen 1 Privacycafé copyright 2016 Data Protec7on Ins7tute BVBA Ons privacybier 2 Privacycafé copyright 2016 Data Protec7on
More informationCO-BRANDING RICHTLIJNEN
A minimum margin surrounding the logo keeps CO-BRANDING RICHTLIJNEN 22 Last mei revised, 2013 30 April 2013 The preferred version of the co-branding logo is white on a Magenta background. Depending on
More informationIJkdijk: June 24 2007 04:33:06
IJkdijk: June 24 2007 04:33:06 IJkdijk tens of thousends kilometers of dike, next generation internet, Grid & business Robert Meijer De IJkdijk: De samenhang tussen tienduizenden kilometers dijkproblemen,
More informationThe information in this report is confidential. So keep this report in a safe place!
Bram Voorbeeld About this Bridge 360 report 2 CONTENT About this Bridge 360 report... 2 Introduction to the Bridge 360... 3 About the Bridge 360 Profile...4 Bridge Behaviour Profile-Directing...6 Bridge
More informationSecurity Assessment Report
Security Assessment Report Prepared by: Opmerking: Alle informatie in dit rapport is uitsluitend bestemd voor gebruik bij bovenvermelde client. Het kan vertrouwelijke en persoonlijke informatie bevatten
More informationPROFIBUS & PROFINET Nederland PROFIBUS, PROFINET en IO-Link. Ede, 12 november 2009
Ede, 12 november 2009 Remote Maintenance voor PROFINET en Ethernet netwerken Ede, 12 november 2009 Voorstellen Cliff van Gellekom Raster Products BV cliff.van.gellekom@raster.com 3 Remote Connectivity
More informationCambridge International Examinations Cambridge International General Certificate of Secondary Education
Cambridge International Examinations Cambridge International General Certificate of Secondary Education DUTCH 0515/01 Paper 1 Listening For Examination from 2015 SPECIMEN MARK SCHEME Approx. 45 minutes
More informationGMP-Z Annex 15: Kwalificatie en validatie
-Z Annex 15: Kwalificatie en validatie item Gewijzigd richtsnoer -Z Toelichting Principle 1. This Annex describes the principles of qualification and validation which are applicable to the manufacture
More informationManagement control in creative firms
Management control in creative firms Nathalie Beckers Lessius KU Leuven Martine Cools Lessius KU Leuven- Rotterdam School of Management Alexandra Van den Abbeele KU Leuven Leerstoel Tindemans - February
More informationBig data, the future of statistics
Big data, the future of statistics Experiences from Statistics Netherlands Dr. Piet J.H. Daas Senior-Methodologist, Big Data research coordinator and Marco Puts, Martijn Tennekes, Alex Priem, Edwin de
More informationMobile Broadband Security Services - A Quick Tutorial
Securing the (public) Enterprise Edge Remko Cijffers Solution Architect Network & Security Customer Summit 12 November 2014 Maarssen Enterprise Security Security top of mind Improve information security
More informationMaking, Moving and Shaking a Community of Young Global Citizens Resultaten Nulmeting GET IT DONE
Making, Moving and Shaking a Community of Young Global Citizens Resultaten Nulmeting GET IT DONE Rianne Verwijs Freek Hermens Inhoud Summary 5 1 Introductie en leeswijzer 7 2 Achtergrond en onderzoeksopzet
More informationWindows Azure Push Notifications
Windows Azure Push Notifications Edwin van Wijk Marco Kuiper #WAZUGPUSH Push Notifications Uitdagingen Oplossingen Windows Azure Demo Windows Azure Push Notifications 2 Introductie Edwin van Wijk edwinw@infosupport.com
More informationIT-waardeketen management op basis van eeuwenoude supply chain kennis
IT-waardeketen management op basis van eeuwenoude supply chain kennis Hans van Aken / November 28, 2012 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject
More informationNL VMUG UserCon March 19 2015
NL VMUG UserCon March 19 2015 VMware Microsoft Let's look beyond the war on checkbox compliancy. Introductie Insight24 Technologie is een middel, geen doel 3x M (Mensen, Methoden, Middelen) & Organisatie
More informationThe new release of Oracle BI 11g R1
The new release of Oracle BI 11g R1 Daan Bakboord Oracle BI Consultant Scamander Solutions OGH 15 September 2010 Informatie als strategisch wapen Even voorstellen (1) Scamander Ik beschik niet snel en
More information* With contributions of: Edwin de Jonge and Paul van den Hurk. Definition and the 3 V s. Can Big Data be used for official statistics?
Big Data (and official statistics) Piet Daas and Mark van der Loo* 3 Statistics Netherlands * With contributions of: Edwin de Jonge and Paul van den Hurk Overview What s Big Data? Definition and the 3
More informationDoorstroommogelijkheden in 3TU-verband in 2008 en 2009
Doorstroommogelijkheden in 3TU-verband in 2008 en 2009 Toelichting: In het onderstaande overzicht is per technische bacheloropleiding aangegeven welke masteropleidingen een drempelloze toelating, dan wel
More informationInformation Security Governance
Information Security Governance Aart Bitter Aart.Bitter@information-security-governance.com Agenda Governance & Compliance Information Security Governance Aanpak om information security governance in organisaties
More information#BMIT. Welcome. Seminar Business Continuity
#BMIT Welcome Seminar Business Continuity Smart Business Strategies Business Meets IT - Agenda 9.30: Market Research: William Visterin, Smart Business Strategies 10.00: Chris De Blende, PwC Business
More informationHR Transformation and Future of HR Brussel, 25 april 2013 Material part 1/2
HR Transformation and Future of HR Brussel, 25 april 2013 Material part 1/2 Doelstellingen Ideeën uitwisselen over hoe een HR transformatie te starten Ervaringen delen over hoe HR toegevoegde waarde kan
More informationHow To Design A 3D Model In A Computer Program
Concept Design Gert Landheer Mark van den Brink Koen van Boerdonk Content Richness of Data Concept Design Fast creation of rich data which eventually can be used to create a final model Creo Product Family
More informationhttp://www.guido.be/intranet/enqueteoverview/tabid/152/ctl/eresults...
1 van 70 20/03/2014 11:55 EnqueteDescription 2 van 70 20/03/2014 11:55 3 van 70 20/03/2014 11:55 4 van 70 20/03/2014 11:55 5 van 70 20/03/2014 11:55 6 van 70 20/03/2014 11:55 7 van 70 20/03/2014 11:55
More informationCyberDEW Een Distributed Early Warning Systeem ten behoeve van Cyber Security
THALES NEDERLAND B.V. AND/OR ITS SUPPLIERS. THIS INFORMATION CARRIER CONTAINS PROPRIETARY INFORMATION WHICH SHALL NOT BE USED, REPRODUCED OR DISCLOSED TO THIRD PARTIES WITHOUT PRIOR WRITTEN AUTHORIZATION
More informationArchiMate@ESCB. Gert Eijkelboom Enterprise Architect De Nederlandsche Bank. NAF Insight ArchiMate, 8 maart 2012
ArchiMate@ESCB Gert Eijkelboom Enterprise Architect De Nederlandsche Bank NAF Insight ArchiMate, 8 maart 2012 Agenda Introductie ESCB Architecture@ESCB ArchiMate Modelling@ESCB Lessons learned Q&a 2 Agenda
More informationWhat Is KAURI?
KAURI Mission (Articles of Association) De vereniging heeft tot doel een platform, kenniscentrum en lerend netwerk te zijn van mensen uit het bedrijfsleven, maatschappelijke organisaties en instellingen,
More informationRound Tables Maintenance Follow up meeting. Aad Veenman Chairman
WELCOME Round Tables Maintenance Follow up meeting Aad Veenman Chairman Program 13.30 Opening bijeenkomst Aad Veenman Start MARE Learning Community Henk Akkermans Onderwijs / steunverklaring Henk Akkermans
More informationCloud. Transformatie. Cases.
Cloud. Transformatie. Cases. Dé cloud bestaat niet. maakt cloud concreet 2 IT Transformatie. Cloud? De vraag is niet of we gaan, maar wanneer en hoe #sogetidoethet Matthias Radder Cloud Consultant 3 In
More informationVirtualisatie. voor desktop en beginners. Gert Schepens Slides & Notities op gertschepens.be
Virtualisatie voor desktop en beginners Gert Schepens Slides & Notities op gertschepens.be Op deze teksten is de Creative Commons Naamsvermelding- Niet-commercieel-Gelijk delen 2.0 van toepassing. Wat
More informationNetwork Assessment Client Risk Report Demo
Network Assessment Client Risk Report Demo Prepared by: Henry Knoop Opmerking: Alle informatie in dit rapport is uitsluitend bestemd voor gebruik bij bovenvermelde client. Het kan vertrouwelijke en persoonlijke
More informationTooway 2015 prices / prijslijst
Tooway Nederland Bergstraat 25 558BL Waalre +340-223656 mailbox@rian-bv.nl info@internetbysatellite.eu Hardware en B2B prijzen zijn excl.btw. Consumer Abonnement prijzen zijn incl. Btw. Tooway 205 prices
More informationPlatform voor Informatiebeveiliging IB Governance en management dashboards
Platform voor Informatiebeveiliging IB Governance en management dashboards Johan Bakker MSc CISSP ISSAP Principal Policy Advisor KPN Corporate Center Information Security Governance Agenda Drivers voor
More informationAUC and the wider learning context. Tilburg, 12 December 2012
1 AUC and the wider learning context Tilburg, 12 December 2012 Aan een academicus/academica anno 2015 mogen meer eisen worden gesteld. Ik heb enkele jaren geleden de inhoud van de academische vorming met
More informationIC Rating NPSP Composieten BV. 9 juni 2010 Variopool
IC Rating NPSP Composieten BV 9 juni 2010 Variopool AGENDA: The future of NPSP Future IC Rating TM NPSP Composieten BV 2 Bottom line 3 Bottom line 4 Definition of Intangibles The factors not shown in the
More informationMaking Leaders Successful Every Day
Making Leaders Successful Every Day Smart Governments Embrace And Enable Digital Disruption In The Age of the Citizen Forrester Research Jennifer Belissent Principal Analyst March 27, 2014 Those who don
More informationExamen Software Engineering 2010-2011 05/09/2011
Belangrijk: Schrijf je antwoorden kort en bondig in de daartoe voorziene velden. Elke theorie-vraag staat op 2 punten (totaal op 24). De oefening staan in totaal op 16 punten. Het geheel staat op 40 punten.
More informationHoorcollege marketing 5 de uitgebreide marketingmix. Sunday, December 9, 12
Hoorcollege marketing 5 de uitgebreide marketingmix Sunday, December 9, 12 De traditionele marketing mix Sunday, December 9, 12 Waarom was dat niet genoeg dan? Sunday, December 9, 12 Omdat er vooruitgang
More informationMetaphors for knowledge
Metaphors for knowledge How metaphors direct the way we manage knowledge in organizations Daan Andriessen INHOLLAND University of professional education Hoofddorp daan.andriessen@inholland.nl 2007 Daan
More informationIndividual project 2010: Kick- off. 13 April 2010
Individual project 2010: Kick- off 13 April 2010 Agenda Purpose of individual project What will be expected of you Support The assignment Client Assignment Deliverables & deadlines Project planning Beoordeling
More informationIf your internal communication is really effective?
If your internal communication is really effective? Who reads what and why and what the impact is? How many info-sharing meetings need to be organised because nobody reads? What the service desk cost of
More informationRelationele Databases 2002/2003
1 Relationele Databases 2002/2003 Hoorcollege 5 22 mei 2003 Jaap Kamps & Maarten de Rijke April Juli 2003 Plan voor Vandaag Praktische dingen 3.8, 3.9, 3.10, 4.1, 4.4 en 4.5 SQL Aantekeningen 3 Meer Queries.
More informationDesign Document. Developing a Recruitment campaign for IKEA. Solve-
Design Document Developing a Recruitment campaign for IKEA. Solve- 02 00 Chapter Index 01. INTRODUCTION 02. GENERAL INFORMATION Informational architecture Sitemap Use case Why use or not use Flash Flowchart
More information3PM²: an integrated approach to enable the execution of organisational strategy. 3PM² - 16 november 2012 Stanwick Management Consultants
3PM²: an integrated approach to enable the execution of organisational strategy 3PM² - 16 november 2012 1 13u30 Welkom Agenda Afspraken 13u40 3PM²: Kader 14u15 Parallelle workshops 15u00 Break 15u15 Parallelle
More informationPolice and gendarmerie reform in Belgium: from force to service
Police and gendarmerie reform in Belgium: from force to service 1 RIJKSWACHT Summary part 1 : the concept failure of the traditional methods the answer : community policing part 2 : the conditions for
More informationHow To Test A Website On A Web Browser
user checks! improve your design significantly" Workshop by Userneeds - Anouschka Scholten Assisted by ArjanneAnouk Interact Arjanne de Wolf AmsterdamUX Meet up - June 3, 2015 Make people s lives better.
More informationBig Data @ CBS. Experiences at Statistics Netherlands. Dr. Piet J.H. Daas Methodologist, Big Data research coördinator. Statistics Netherlands
Big Data @ CBS Experiences at Statistics Netherlands Dr. Piet J.H. Daas Methodologist, Big Data research coördinator Statistics Netherlands April 20, Enschede Overview Big Data Research theme at Statistics
More informationACCESS CONTROL AND SERVICE-ORIENTED ARCHITECTURES
ACCESS CONTROL AND SERVICE-ORIENTED ARCHITECTURES PROEFSCHRIFT ter verkrijging van de graad van doctor aan de Universiteit van Tilburg, op gezag van de rector magnificus, prof.dr. F.A. van der Duyn Schouten,
More informationRisk-Based Monitoring
Risk-Based Monitoring Evolutions in monitoring approaches Voorkomen is beter dan genezen! Roelf Zondag 1 wat is Risk-Based Monitoring? en waarom doen we het? en doen we het al? en wat is lastig hieraan?
More informationPitches Datamanagement:
Pitches Datamanagement: 1. Thermo Fisher Scientific 2. STARLIMS Netherlands 3. Siemens Industry Software 4. LabWare Limited 5. LabVantage Solutions 6. Da Vinci Laboratory Solutions 7. Asystance 8. ivention
More informationSafety Analysis Nitrogen Vessel
Safety Analysis Nitrogen Vessel Nikhef number: Item number: Date: 18/10/2010 Page: 1 of 21 47110-MT-00004 AA1409 Status: In Work Revision: A.6 Project: Gravitational Waves Virgo Cryogenic Link Department:
More informationOntwikkelingen in het onderwijs. Eduard Beck & Martin Diepeveen 31 maart 2016
Ontwikkelingen in het onderwijs Eduard Beck & Martin Diepeveen 31 maart 2016 Studenten brengen steeds vaker hun eigen devices mee. Ze studeren niet alleen met laptops, maar ook met tablets en smartphones.
More informationSchadevoorziening bij brand- en bouwveiligheid
Schadevoorziening bij brand- en bouwveiligheid Amsterdam, september 2013 In opdracht van WODC Schadevoorziening bij brand- en bouwveiligheid Een evenwichtig systeem? Bert Hof en Nicole Rosenboom Roetersstraat
More informationMijn spelen is mijn leren, dus speel ik computerspelletjes
De technologie van het leren Mijn spelen is mijn leren, dus speel ik computerspelletjes Jacob van Kokswijk CapGemini Professor in Virtualisation KU Leuven (BE) Universiteit Leuven, BioMedische school,
More informationSpecification by Example (methoden, technieken en tools) Remco Snelders Product owner & Business analyst
Specification by Example (methoden, technieken en tools) Remco Snelders Product owner & Business analyst Terminologie Specification by Example (SBE) Acceptance Test Driven Development (ATDD) Behaviour
More informationProgram overview. 09-Jul-2016 16:40. Year 2013/2014 Technology, Policy and Management
Program overview 09-Jul-016 16:40 Year 013/014 Organization Technology, Policy and Management Education Minors WM Code Omschrijving ECTS WM-Mi-101-13 WM-Mi-101-13 International Entrepreneurship and Development
More informationTHE EMOTIONAL VALUE OF PAID FOR MAGAZINES. Intomart GfK 2013 Emotionele Waarde Betaald vs. Gratis Tijdschrift April 2013 1
THE EMOTIONAL VALUE OF PAID FOR MAGAZINES Intomart GfK 2013 Emotionele Waarde Betaald vs. Gratis Tijdschrift April 2013 1 CONTENT 1. CONCLUSIONS 2. RESULTS Reading behaviour Appreciation Engagement Advertising
More informationEngineering Natural Lighting Experiences
Engineering Natural Lighting Experiences Elke den Ouden & Emile Aarts Earth from outer space is beautiful Andre Kuipers during his ISS Expedition 31/32, 2011-2012 Earth in a sun eclipse Nothern polar region
More informationSURE: Statistics on the Usage of REpositories
SURE: Statistics on the Usage of REpositories Funding: Project Manager: SURFfoundation Peter Verhaar Start date: 17-04-2009 Completion date (expected): 31-03-2010 Document Details Date Author Status 18/05/2009
More informationDe rol van requirements bij global development
De rol van requirements bij global development 19 & 25 november 2008 Rini van Solingen Requirements zijn een noodzakelijk kwaad Immers, als wij elkaars gedachten konden lezen hadden we geen requirements
More informationPresentation about Worknets on the Bridge-IT conference. Barcelona, March 2011
Presentation about Worknets on the Bridge-IT conference Barcelona, March 2011 Networks (Gaining new relations) Worknets (Making relations beneficial) to help organizations work together for common good
More informationtablet technologie in het onderwijs
tablet technologie in het onderwijs prof. dr. marcus specht Centre for Learning Sciences and Technologies Open Universiteit Nederland marcus.specht@ou.nl twitter, flickr, facebook: marcuspecht 1 OUNL and
More informationInclusive Education : An international perspective
Inclusive Education : An international perspective Dr Cor Meijer, director www.european-agency.org Member countries of the Agency Presently, the Agency has 27 full member countries: Austria, Belgium (French),
More informationMINISTRY OF DEFENCE LANGUAGES EXAMINATIONS BOARD
Name: Candidate Registration Number: Date of Exam: MINISTRY OF DEFENCE LANGUAGES EXAMINATIONS BOARD SURVIVAL SLP1 DUTCH PAPER A Reading Task 1 Task 2 Time allowed Translation Comprehension 15 minutes Candidates
More informationProprietary Kroll Ontrack. Data recovery Data management Electronic Evidence
Data recovery Data management Electronic Evidence Back-up migratie of consolidatie TAPE SERVICES Overview The Legacy Tape Environment Common Legacy Tape Scenarios Available Options Tape Service Components
More informationEnvironment-behavior Studies and Design Research.
Environment-behavior Studies and Design Research. Dr. Joost van Andel Eindhoven University of Technology Department of Philosophy and Social Sciences 1. DESCRIPTION OF THE RESEARCH GROUP Environment-behavior
More informationSpecial Interest Group Oracle WebCenter
Special Interest Group Oracle WebCenter Eric Bos Oracle ECM Consultant 28 Oktober 2013 1 Oracle WebCenter Capture 1. Webcenter Capture vs OFR (Perceptive IDC) 2. WebCenter Capture 3. Workspaces en andere
More informationIs het nodig risico s te beheersen op basis van een aanname..
Is het nodig risico s te beheersen op basis van een aanname.. De mens en IT in de Zorg Ngi 19 april 2011 René van Koppen Agenda Er zijn geen feiten, slechts interpretaties. Nietzsche Geen enkele interpretatie
More informationHoeveel is uw informatievoorziening waard?
Hoeveel is uw informatievoorziening waard? Meer waarde uit IT met het IT Capability Maturity Framework (IT-CMF) Agenda TNO en IT Besturing Achtergrond en positionering van het IT-CMF IT-CMF in de diepte
More informationWhat can Office 365 do for your organization? Cor Kroon
What can Office 365 do for your organization? Cor Kroon Ciber Knowledge Carrousel 2013 What can Office 365 do for your Organization? Cor Kroon Business Analyst / Senior Microsoft Professional cor.kroon@ciber.nl
More informationThe network serves as a medium for new media art. This does not comprise a
OKNO werd opgericht om in collectief aan een gedeelde visie te kunnen werken. Als groep ge?ngageerde kunstenaars bouwen we aan onze vreemde, ongedefinieerde discipline en ruimen we er plaats voor in het
More informationQuerying Microsoft SQL Server 2012
Querying Microsoft SQL Server 2012 Cursusduur: 5 Dagen Cursuscode: M10774 Beschrijving: Deze cursus is vervangen door cursus M20461 Querying Microsoft SQL Server. This course has been replaced by course
More informationUniface 9.7.01 en PostgreSQL, de eerste ervaringen
Uniface 9.7.01 en PostgreSQL, de eerste ervaringen Arjen van Vliet Solution Consultant donderdag 26 november 2015 Agenda 1. Wat gebeurt er in de database markt? 2. Kenmerken van PostgreSQL 3. Stappenplan
More informationActive Security: Welfare to Work on the Work Floor
Active Security: Welfare to Work on the Work Floor Els Sol International research conference: The global financial crisis and new governance of labour market policies, Copenhagen, 24-25 June 2010 Content
More informationIS research relevance from an industrial perspective. Ir. A.F.Baldinger Chairman of NAF
IS research relevance from an industrial perspective Ir. A.F.Baldinger Chairman of NAF A.F.Baldinger Studied Applied Physics TU Delft [66-73] Industry Experience: 35 years experience (Telecom, Software
More informationHet Secure Datacenter
Het Secure Datacenter If trust and reliability matters Michiel Steltman CTO Siennax Drivers voor IT Security Financiële aansprakelijkheid Sox, Basel II Persoonlijke aansprakelijkheid van managers Operationele
More information5 e CSIT World Sports Games
UITNODIGING 5 e CSIT World Sports Games 13 tot 18 Juni, 2017 Riga Letland Het Baltische CSIT-lid, de Latvian Sport for All Association LTSA, is gastheer voor de 5 e CSIT WORLD SPORTS GAMES die zullen doorgaan
More informationExample-Based Treebank Querying. Liesbeth Augustinus Vincent Vandeghinste Frank Van Eynde
Example-Based Treebank Querying Liesbeth Augustinus Vincent Vandeghinste Frank Van Eynde LREC 2012, Istanbul May 25, 2012 NEDERBOOMS Exploitation of Dutch treebanks for research in linguistics September
More informationTRENDS IN TRAVEL. GfK turning research into business opportunities. Judith Nijk, 05-02-2015
TRENDS IN TRAVEL GfK turning research into business opportunities Judith Nijk, 05-02-2015 1 GfK. Growth from Knowledge. Trusted for quality. For 80 years. 13,000 passionate experts We are the trusted source
More informationSelf-employed and independent IT professional, specialized in enterprise and solutions architecture.
CV Joris Bol Joris Bol Architectable Molendijk 24, 3284 LJ, Zuid Beijerland 06 5345 8104 info@architectable.nl www.architectable.nl Summary Self-employed and independent IT professional, specialized in
More informationWelkom! Copyright 2014 Oracle and/or its affiliates. All rights reserved.
Welkom! WIE? Bestuurslid OGh met BI / WA ervaring Bepalen activiteiten van de vereniging Deelname in organisatie commite van 1 of meerdere events Faciliteren van de SIG s Redactie van OGh-Visie Onderhouden
More informationSoftware VOC netwerkbijeenkomst De kansen van OEM. Hans Schut OEM Partner Manager Nederland 9 juli 2014
Software VOC netwerkbijeenkomst De kansen van OEM Hans Schut OEM Partner Manager Nederland 9 juli 2014 Wat is OEM? Het principe Wanneer een bedrijf zijn producten verkoopt aan andere bedrijven, en dat
More informationHoe onze wereld aan het veranderen is
Hoe onze wereld aan het veranderen is Michiel Schaalje CTO Cisco Nederland Sinds 1996 actief binnen Cisco Vanaf 2006 verantwoordelijk voor o.a. de gehele Nederlandse presales organisatie Richt zich vanuit
More informationSubject information: Subject: English
LESSON PLAN: Show your commercial Pimp my product curriculum: Week 6, Lesson 16 Names & student numbers: Jolly Ferwerda - 1608458 Réka Brendel-Kovács - 1611031 Jolanda Lannagan - 1614357 Bao-Nhi Vu - 1503814
More informationImplementeren van HL7v3 Web Services
Implementeren van HL7v3 Web Services - Marc de Graauw - SOAP & WSDL SOAP & WSDL Intro WSDL & code generation Dynamic response, wrapped style Generic WSDL Reliability issues Wire signature Web Services
More informationSerious Game for Amsterdam Nieuw-West
Serious Game for Amsterdam Nieuw-West User Research - Quantitative Date: By: Coaches: September 2013 G. Kijne Dr. Ir. R. Mugge Dr. Ir. N.A. Romero Herrera V. Bolsius Dr. I. Wenzler User Research Methodology
More informationFerjan Ormeling. Mobile Solutions Specialist Microsoft BV
Ferjan Ormeling Mobile Solutions Specialist Microsoft BV Mobile Scenarios System Center Configuration Manager Exchange System Center Mobile Device Manager Security Management Ent CAL Std CAL Device Management
More informationUw partner in system management oplossingen
Uw partner in system management oplossingen User Centric IT Bring your Own - Corporate Owned Onderzoek Forrester Welke applicatie gebruik je het meest op mobiele devices? Email 76% SMS 67% IM / Chat 48%
More informationIMPT Intensity Modulated Proton Therapy
IMPT Intensity Modulated Proton Therapy VARIAN PARTICLE THERAPY Jan Timmer VPT Head of Marketing Protonentherapie Varian Projecten ProBeam Eclipse 2 VARIAN PARTICLE THERAPY Protonentherapie Actuele Ontwikkelingen
More information