Breadcrumb Research Projects Go to Factors contributing to negotiation, payment, and reporting by ransomware victims Factors contributing to negotiation, payment, and reporting by ransomware victims Ransomware is currently considered one of the primary online threats. However, little is known about the extent of ransomware victimization among citizens and entrepreneurs. Read more Go to Keeping Young ICT Talent on the Right Path: A Plan and Process Evaluation Keeping Young ICT Talent on the Right Path: A Plan and Process Evaluation This project focuses on evaluating a recently developed intervention for young people aged 12 to 25 who have an interest in ICT and who sometimes explore or cross legal boundaries online. Read more Go to Digital Security in the Greenports Digital Security in the Greenports For many organisations in the horticultural sector, essential cybersecurity measures are still in their infancy, leaving them exposed to significant financial and operational risks. Read more Go to How Can Web Developers Ensure Secure Coding? How Can Web Developers Ensure Secure Coding? Web developers indicate that secure coding—or improving code security—is a top priority. Read more Go to Project C-SIDE: Cyber Security by Integrated Design Project C-SIDE: Cyber Security by Integrated Design The primary objective of C-SIDE is to develop a methodology for designing secure software systems. Read more Go to DurableCASE: robotic vehicles in the agricultural sec-tor DurableCASE: robotic vehicles in the agricultural sec-tor A large number of parties, including The Hague University of Applied Sciences through the Network & Systems Engineering research group of the CoECS, will be working together in the coming years to develop solutions for... Read more Pagination First Page Previous Pagina 1 1 Current page 2
Go to Factors contributing to negotiation, payment, and reporting by ransomware victims Factors contributing to negotiation, payment, and reporting by ransomware victims Ransomware is currently considered one of the primary online threats. However, little is known about the extent of ransomware victimization among citizens and entrepreneurs. Read more
Go to Keeping Young ICT Talent on the Right Path: A Plan and Process Evaluation Keeping Young ICT Talent on the Right Path: A Plan and Process Evaluation This project focuses on evaluating a recently developed intervention for young people aged 12 to 25 who have an interest in ICT and who sometimes explore or cross legal boundaries online. Read more
Go to Digital Security in the Greenports Digital Security in the Greenports For many organisations in the horticultural sector, essential cybersecurity measures are still in their infancy, leaving them exposed to significant financial and operational risks. Read more
Go to How Can Web Developers Ensure Secure Coding? How Can Web Developers Ensure Secure Coding? Web developers indicate that secure coding—or improving code security—is a top priority. Read more
Go to Project C-SIDE: Cyber Security by Integrated Design Project C-SIDE: Cyber Security by Integrated Design The primary objective of C-SIDE is to develop a methodology for designing secure software systems. Read more
Go to DurableCASE: robotic vehicles in the agricultural sec-tor DurableCASE: robotic vehicles in the agricultural sec-tor A large number of parties, including The Hague University of Applied Sciences through the Network & Systems Engineering research group of the CoECS, will be working together in the coming years to develop solutions for... Read more