photo of EHDS
EHDS

The European Commission recently proposed the European Health Data Space (EHDS) which aims to facilitate secondary use of health data. in this project we intend to discuss the challenges, pitfalls, and potential criticalities underlying the proposed realization of the EHDS, while also pointing to viable alternatives and possible solutions to the issues identified.

photo of Predictive policing and its discriminatory risks
Predictive policing and its discriminatory risks

The Dutch Crime Anticipation System (CAS) has been embraced as a step towards forward-looking crime prevention, but it has also been criticized for its potential discriminatory effects in both design and application. This project focuses on whether CAS has risks of discrimination and what interventions are possible to mitigate this risk.

photo of Sphere Transgression Watch
Sphere Transgression Watch

Sphere Transgression Watch is a digital tool that tracks the growing presence of Big Tech in different spheres of our society over time.

photo of PubHubs
PubHubs

PubHubs is a new public value driven social network.

photo of Twid: fighting desinformation on Twitter with authenticity
Twid: fighting desinformation on Twitter with authenticity

Experiment to see if adding authenticity to Twitter messages (using IRMA signatures) can counter the spread of disinformation.

photo of Polymorphic Encryption and Pseudonimisation
Polymorphic Encryption and Pseudonimisation

Polymorphic Encryption and Pseudonymisation: privacy and security by design in a medical research context.

photo of PostGuard: encryption for all
PostGuard: encryption for all

This project addresses the fundamental societal problem that encryption as a technique is available since decades, but has never been widely adopted, mostly because it is too difficult or cumbersome to use for the public at large.

photo of Do algorithms know better? First-person authority in the age of big data
Do algorithms know better? First-person authority in the age of big data

This project investigates the tensions between algorithmic authority and first-person authority, and develops a map of the relevant ethical implications.

photo of Solidarity in times of a pandemic
Solidarity in times of a pandemic

Solidarity in times of a pandemic: What do people do, and why? A European comparative study.

photo of Digital good
Digital good

The digital disruption of health research and the common good: an empirical-philosophical study.

photo of Private law, cybersecurity and privacy
Private law, cybersecurity and privacy

Looking into the existence, scope and enforcement of legal cybersecurity obligations, in particular in the realm of the protection of personal data.

Archive

photo of iHub-IMR Call for PhD (pre)proposals on the theme ‘Responsible governing in a digital age’
iHub-IMR Call for PhD (pre)proposals on the theme ‘Responsible governing in a digital age’

The central themes iHub and IMR research allow for many interesting collaboration opportunities and together provide an answer to the question: What does responsible governance in a digital age look like? To strengthen the ties between iHub and the Faculty of Management, two co-funded PhD positions are available. These PhD positions will be interdisciplinary, and will be supervised by one (co)promotor affiliated to the iHub (for example an iHub member from a different faculty) and one (co)promotor from the Faculty of Management.

photo of IRMA Vote
IRMA Vote

Building a privacy-friendly small scale online voting system, to be used for voting for neighbourhood plans.

photo of Cybersecurity from a human-oriented perspective: Awareness & Behavior change
Cybersecurity from a human-oriented perspective: Awareness & Behavior change

Organizations have been widely committed to cybersecurity awareness campaigns in recent years, often with limited success. Human error remains the main reason for security breaches and undesired data disclosure.

photo of Dark and bright patterns in cookie consent requests
Dark and bright patterns in cookie consent requests

There is a trend towards persuasive interface designs (called dark patterns) which push (or nudge) users towards agreeing to online tracking.

photo of IRMA made easy
IRMA made easy

Authentication methods, like passwords, often involve a trade-off between usability and security. Secure passwords are a hassle to use, and easy-to-use passwords are often also easy to guess or to brute force. Clearly, there is a need for authentication methods that are both secure and user-friendly.

photo of SECREDAS: Product Security for Cross Domain Reliable Dependable Automated Systems
SECREDAS: Product Security for Cross Domain Reliable Dependable Automated Systems

SECREDAS aims to develop and validate multi-domain architecting methodologies, reference architectures & components for autonomous systems. The goal is to incorporate high security and privacy protection while preserving functional-safety and operational performance.

photo of DECODE: DEcentralised Citizens Owned Data Ecosystem
DECODE: DEcentralised Citizens Owned Data Ecosystem

DECODE provides tools that put individuals in control of whether they keep their personal information private or share it for the public good.