1,391 search results for “data” in the Staff website
-
Omics data integration with genome-scale modelling of dopaminergic neuronal metabolism
PhD defence
-
Exploring big data approaches in the context of early stage clinical
PhD defence
-
Learning Class-Imbalanced Problems from the Perspective of Data Intrinsic Characteristics
PhD defence
-
Tinder match? Use facial recognition first
Recent developments in AI mean nobody is anonymous nowadays. The search engine PimEyes can find any photo of anyone that’s ever been placed online. No more Tinder Swindlers… or personal privacy. Everyone’s findable now. But is that even allowed?
-
‘Technology shouldn’t shape our future; we should’
Technology holds so much promise – from self-driving cars to enhanced physical performance from smart implants under the skin. But we should not let ourselves be caught off guard. That is the message of Bart Custers, Professor of Law and Data Science in his inaugural lecture on 21 May. ‘We don’t talk…
-
Simone van der Hof
Faculteit Rechtsgeleerdheid
s.van.der.hof@law.leidenuniv.nl | +31 71 527 8838
-
Applications of multisource data-based dynamic modeling to cell-cell signaling and infectious disease spreading
PhD defence
-
Digging through data: the rise and fall of a Miocene mammal biodiversity hotspot in the Vallès-Penedès (Catalonia, Spain)
PhD defence
-
Researcher develops Google for archaeologists
An incredible quantity of archaeological reports are stored in digital archives. If you want to search for information in them, you have to do this manually. And that is a real chore. Archaeologist Alex Brandsen has now used deep learning, a form of artificial intelligence, to develop a search engine…
-
Simone van der Hof in podcast on GDPR and children’s rights
In a podcast of the Netherlands Internet Governance Forum (NL GF) and the Safer Internet Centre Nederland, Simone van der Hof, Professor of Law and Digital Technologies at Leiden University and Thijs Hannema, a lawyer at Kennedy van der Laan, discuss online privacy of children.
-
Simone van der Hof awarded EU funding for research on age verification and consent mechanisms
As part of the euCONSENT consortium, the Center for Law and Digital Technologies (eLaw) has been awarded European Commission funding to create a child rights’ centred cross-border system for online age verification and parental consent.
-
First professionals obtained their certificates Legal Technologies: ‘It was intensive, fun, and enlightening’
Last week, the first seven professionals successfully completed the new Leiden Legal Technologies Programme (LLTP). They received their certificates during a festive ceremony. Smiling faces all around for founder Jaap van den Herik, Programme Director Nikol Hopman, and The Hague alderman Saskia Bruines.…
- multi-lingual circulation of knowledge an empirical study of the available data sources in Latin America
-
Symposium on technology and trust: ‘Think about privacy and security before introducing new systems’
From scanners in lecture halls to systems for working from home: the discussion about new technology is being held on various fronts. That is why the University wants to make more use of its in-house experts. At the Technology and Trust symposium at Leiden University on 2 February, researchers from…
-
Florence Nightingale Colloquium
Lecture, colloquium
-
Will AI be listening in on your future job interview? On law, technology and privacy
The law and Artificial Intelligence (AI) applications need to be better aligned to ensure our personal data and privacy are protected. PhD candidate Andreas Häuselmann can see opportunities with AI, but dangers if this does not happen.
-
Datamanagement
Data management refers to creating, saving, updating, making available, archiving and long-term storage of research data. The final goal of this process is often defined in terms of the FAIR principles: 'Findable, Accessible, Interoperable and Re-usable'.
-
Storage and sharing
Estimate the amount of data you have created and what will be added?
-
What to archive?
Start thinking in advance about the selection for long-term preservation.
-
Datamanagement
Data management refers to creating, saving, updating, making available, archiving and long-term storage of research data. The final goal of this process is often defined in terms of the FAIR principles: 'Findable, Accessible, Interoperable and Re-usable'.
-
Interview with Jaap van den Herik by BNVKI
Recently, Jaap van den Herik, professor emeritus Law and IT, was interviewed by the BNVKI (Benelux Association for Artificial Intelligence).
-
Open Science and archiving
Slowly but surely Open Science is becoming a standard in scholarly research, making it more open, collaborative, transparent, and after all FAIR, from its planning stages to publishing and re-use of data.
-
Informed consent
If you handle personal data, there are a number of legal grounds on which this can be done. One example involves obtaining consent from the person in question, also known as 'informed consent'. This informed consent must adhere to several requirements.
-
Directory structure and file naming
Think of a clear and consistent directory structure.
-
Tooling
Standard software is provided through the Software Centre.
-
ICT and research
ICT plays an important role in scientific research. With the help of ICT it is easier to collect, manage, analyse and share complex research data.
-
Datamanagement
Data management refers to creating, saving, updating, making available, archiving and long-term storage of research data. The final goal of this process is often defined in terms of the FAIR principles: 'Findable, Accessible, Interoperable and Re-usable'.
-
Metadata
Keep in mind a fellow researcher: someone who knows your area of expertise, but not necessarily as well as you do. Are your files understandable as they are, or do they need cleaning enhancement? Keep the right balance: make sure the metadata is sufficient for reuse, but do not get carried away and…
-
Privacy Service Point
The Privacy Service Point is responsible for the application of and compliance with privacy legislation.
-
Project Management
Create an inventory of all the people/roles (potentially) involved in the research project, including their roles and responsibilities (concerning the research data), as well as how they relate to the university.
-
Qualtrics
Qualtrics survey software allows you to create online questionnaires for your research. It provides various question types, branch logic and the possibility to export results to statistical software, such as SPSS.
-
Qualitative interviewing
-
SAILS Lunch Time Seminar
Lecture
-
Open Access and access rights
Complete open access may not be possible because of various reasons: research ethics, privacy legislation, intellectual property, continuing research. The Easy archive at KNAW/DANS provides various access levels to deal with these issues.
-
Tools and tips for working securely
Curious to find out how you can contribute to a safe working environment? Then keep reading to discover our tips for working securely. They will help you to work more safely in specific situations. This section contains tools and tips to promote safe working habits in specific situations.
-
Information Security
Taking care of storing your data and making timely backups is a crucial step of good research data management practices because it is not possible to archive something that has been lost.
-
Policies, codes of conduct, and laws
There are regulatory policies and recommendations in place, which you should comply with and take into consideration during your research.
-
Research Ethics
The Ethics Committee gives binding advice on ethical issues in research. This may be the case when you handle sensitive data. But also in other cases, like handling human remains, the Ethics Committee may require you to take steps to protect your data, which will implicate Research Data Management.
-
Reporting incidents
Information security is essential for Leiden University. This means not only that we deal with (sensitive) information in a secure and conscious manner, but also that incidents are reported as soon as possible. You can read below how to report incidents.
-
Creating web forms
If you need to create online forms, you can do this using Formdesk. This tool can be used for registrations for events and for asking for feedback.
-
Support
The FSW offers support in all stages of performing your research.
-
Editing room 1A45
Want to edit video, photo and audio material with Adobe Creative Cloud apps? You can do so on the computers in editing room 1A45.
-
During your research
During your research you might have to set up laboratory space, programme tasks, collect, analyse and store data. The FSW offers support in all stages of your research.
-
Forms and regulations
The PhD Regulations are established by the Doctorate Board. The regulations set out who is eligible to be a PhD candidate, what the tasks of the supervisor and co-supervisor are and which criteria the dissertation has to meet.
-
File formats
For people to reuse your data, the file formats you publish them in must be “open” as well.
-
Gianclaudio Malgieri will give keynote speech on Fundamental Rights and Vulnerability at Maastricht University
Dr. Gianclaudio Malgieri, Associate Professor of Law & Technology at eLaw, and Co-Director of the Brussels Privacy Hub, will deliver a keynote speech at Maastricht University. This keynote is a part of the Maastricht Experience Week, which focuses on the "Future of Privacy, Cybersecurity, and Data Management."…
-
Datamanagement
Data management refers to creating, saving, updating, making available, archiving and long-term storage of research data. The final goal of this process is often defined in terms of the FAIR principles: 'Findable, Accessible, Interoperable and Re-usable'.
-
Save the date: Summer Training Week
Seminar series
-
Lab facilities and protocols
Leiden University has high-quality research facilities and laboratories for education and research.
-
Working securely online
All employees of Leiden University handle data or personal information. And it is very likely that, at some point or another, everyone will receive a suspicious email or have to deal with other attempts by hackers to gain access to this data. Some cybercriminals try to obtain data because they want…