Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
- Delft University of Technology (TU Delft)
- Delft University of Technology (TU Delft); Delft
- Delft University of Technology (TU Delft); yesterday published
- University of Amsterdam (UvA)
- University of Groningen
- Delft University of Technology (TU Delft); today published
- Leiden University
- Radboud University
- University of Amsterdam (UvA); Amsterdam
- Eindhoven University of Technology (TU/e)
- University of Amsterdam (UvA); yesterday published
- University of Twente (UT)
- Eindhoven University of Technology (TU/e); yesterday published
- Leiden University; 's-Gravenhage
- University of Amsterdam (UvA); today published
- University of Groningen; Groningen
- Delft University of Technology
- Delft University of Technology (TU Delft); 10 Oct ’25 published
- Delft University of Technology (TU Delft); 3 Oct ’25 published
- Eindhoven University of Technology (TU/e); 4 Oct ’25 published
- Erasmus University Rotterdam
- Leiden University; today published
- Maastricht University (UM)
- Maastricht University (UM); 26 Sep ’25 published
- Radboud University; yesterday published
- The Open Universiteit (OU)
- The Open Universiteit (OU); today published
- Tilburg University
- Universiteit van Amsterdam
- University Medical Center Utrecht (UMC Utrecht)
- University Medical Center Utrecht (UMC Utrecht); today published
- University of Amsterdam (UvA); 10 Oct ’25 published
- University of Twente
- University of Twente (UT); 26 Sep ’25 published
- Wageningen University and Research Center
- 25 more »
- « less
-
Field
-
PhD in organisational cybersecurity: End-users and teams (1.0 fte) For our NWO-funded project “From ‘what went wrong’ to ‘what works well?’ Using Safety 2 principles to develop new cybersecurity
-
resources needed to deploy DPPs will be challenged. Its technical legitimacy depends on the reliability of the global DPP infrastructure: is the data completely, accurately and securely stored and transmitted
-
Apply now PhD in organisational cybersecurity: End-users and teams (1.0 fte) For our NWO-funded project “From ‘what went wrong’ to ‘what works well?’ Using Safety 2 principles to develop new
-
Apply now PhD position in organisational cybersecurity: Organisational differences (1.0 fte) For our NWO-funded project “From ‘what went wrong’ to ‘what works well?’ Using Safety 2 principles
-
process applications sent by email and/or post. As part of knowledge security, TU Delft conducts a risk assessment during the recruitment of personnel. We do this, among other things, to prevent
-
skills; The name and email address of an academic reference who is willing to provide a reference letter upon request. A knowledge security check can be part of the selection procedure. (for details
-
online. We will not process applications sent by email and/or post. A pre-employment screening can be part of the selection procedure. For the final candidates, a knowledge security check will be part of
-
of TPM provides an important contribution to solving complex technical-social issues, such as energy transition, mobility, digitalisation, water management and (cyber) security. TPM does this with its
-
of knowledge security, TU Delft conducts a risk assessment during the recruitment of personnel. We do this, among other things, to prevent the unwanted transfer of sensitive knowledge and technology
-
applications sent by email and/or post. As part of knowledge security, TU Delft conducts a risk assessment during the recruitment of personnel. We do this, among other things, to prevent the unwanted transfer