Predictive policing and its discriminatory risks

The Dutch Crime Anticipation System (CAS) has been embraced as a step towards forward-looking crime prevention, but it has also been criticized for its potential discriminatory effects in both design and application. This project focuses on whether CAS has risks of discrimination and what interventions are possible to mitigate this risk.

photo of Twid: fighting desinformation on Twitter with authenticity
Twid: fighting desinformation on Twitter with authenticity

Experiment to see if adding authenticity to Twitter messages (using IRMA signatures) can counter the spread of disinformation.

Polymorphic Encryption and Pseudonimisation

Polymorphic Encryption and Pseudonymisation: privacy and security by design in a medical research context.

Do algorithms know better? First-person authority in the age of big data

This project investigates the tensions between algorithmic authority and first-person authority, and develops a map of the relevant ethical implications.

Solidarity in times of a pandemic

Solidarity in times of a pandemic: What do people do, and why? A European comparative study.

Digital good

The digital disruption of health research and the common good: an empirical-philosophical study.

Private law, cybersecurity and privacy

Looking into the existence, scope and enforcement of legal cybersecurity obligations, in particular in the realm of the protection of personal data.

Archive

photo of IRMA Vote
IRMA Vote

Building a privacy-friendly small scale online voting system, to be used for voting for neighbourhood plans.

Cybersecurity from a human-oriented perspective: Awareness & Behavior change

Organizations have been widely committed to cybersecurity awareness campaigns in recent years, often with limited success. Human error remains the main reason for security breaches and undesired data disclosure.

Dark and bright patterns in cookie consent requests

There is a trend towards persuasive interface designs (called dark patterns) which push (or nudge) users towards agreeing to online tracking.

photo of IRMA made easy
IRMA made easy

Authentication methods, like passwords, often involve a trade-off between usability and security. Secure passwords are a hassle to use, and easy-to-use passwords are often also easy to guess or to brute force. Clearly, there is a need for authentication methods that are both secure and user-friendly.

photo of SECREDAS: Product Security for Cross Domain Reliable Dependable Automated Systems
SECREDAS: Product Security for Cross Domain Reliable Dependable Automated Systems

SECREDAS aims to develop and validate multi-domain architecting methodologies, reference architectures & components for autonomous systems. The goal is to incorporate high security and privacy protection while preserving functional-safety and operational performance.

photo of DECODE: DEcentralised Citizens Owned Data Ecosystem
DECODE: DEcentralised Citizens Owned Data Ecosystem

DECODE provides tools that put individuals in control of whether they keep their personal information private or share it for the public good.