663 search results for “data” in the Staff website
-
Professionalizing your community: an example from data management
Webinar
-
Data Carpentry with R for Social Sciences and Humanities
Workshop
-
Data Carpentry with R for Social Sciences and Humanities
Workshop
-
From data to discoveries: machine learning and optimization in space
Lecture
-
Franco Donati
Science
f.donati@cml.leidenuniv.nl | +31 71 527 4571
-
Open Science in the Humanities: From Public Discourse to Qualitative Data
Lecture
-
EUniWell Open Lecture Series | “Soli-Data-Rity” - The use of data for personalised medicine
Lecture, Lecture part of a series
-
Simone van der Hof
Faculteit Rechtsgeleerdheid
s.van.der.hof@law.leidenuniv.nl | +31 71 527 8838
-
Florence Nightingale Colloquium
Lecture, colloquium
-
Informed consent
If you handle personal data, there are a number of legal grounds on which this can be done. One example involves obtaining consent from the person in question, also known as 'informed consent'. This informed consent must adhere to several requirements.
-
Report a potential incident immediately
Imagine you’ve accidentally sent a CV to the wrong email address or left your laptop on the train; a momentary lapse of concentration can result in a data breach or security incident. By responding quickly, we can limit the damage and consequences for privacy: both your own and the university’s. You…
-
ICT and research
ICT plays an important role in scientific research. With the help of ICT it is easier to collect, manage, analyse and share complex research data.
-
Datamanagement
Data management refers to creating, saving, updating, making available, archiving and long-term storage of research data. The final goal of this process is often defined in terms of the FAIR principles: 'Findable, Accessible, Interoperable and Re-usable'.
-
Think carefully before sharing anything
Sharing data and documents with colleagues or other organisations can be useful, but it can also entail various risks. You should therefore think carefully before sharing anything, and always ask if you’re not sure whether sharing is permitted.
-
Privacy Service Point
The Privacy Service Point is responsible for the application of and compliance with privacy legislation.
-
Qualtrics
Qualtrics survey software allows you to create online questionnaires for your research. It provides various question types, branch logic and the possibility to export results to statistical software, such as SPSS.
-
Tools and tips for working securely
Curious to find out how you can contribute to a safe working environment? Then keep reading to discover our tips for working securely. They will help you to work more safely in specific situations. This section contains tools and tips to promote safe working habits in specific situations.
-
SAILS Lunch Time Seminar
Lecture
-
Reporting incidents
Information security is essential for Leiden University. This means not only that we deal with (sensitive) information in a secure and conscious manner, but also that incidents are reported as soon as possible. You can read below how to report incidents.
-
Creating web forms
If you need to create online forms, you can do this using Formdesk. This tool can be used for registrations for events and for asking for feedback.
-
Use safe tools
Using secure tools ensures that information and personal data are well protected. ‘Tools’ refers to software that can help you perform your work efficiently, such as email software or a file-sharing system. To quickly see whether a specific tool is permitted, check the tool picker!
- Events
-
Working securely online
All employees of Leiden University handle data or personal information. And it is very likely that, at some point or another, everyone will receive a suspicious email or have to deal with other attempts by hackers to gain access to this data. Some cybercriminals try to obtain data because they want…
-
Academic integrity
The integrity and reliability of academic research are of fundamental importance to the University. All parties, both within and outside the University, must be able to have confidence that our research is conducted in a scrupulous, fair, verifiable, impartial and independent manner.
-
Mobile telephony
If you need a mobile telephone or a mobile subscription or data-only subscription, can apply for it via the helpdesk portal. You can also contact the helpdesk portal if you need to change or cancel a mobile or data-only subscription.
-
Registration and contract
As you are a new Leiden University staff member, a number of things must happen before we can draw up your contract and activate your ULCN account. This is also the case if you are affiliated with the university as external staff, for example if you were hired as a freelancer.
-
Sharing and sending files
If you wish to share files with colleagues within or outside the university, you can save these files in the cloud. You can do this with Office 365 or OneDrive. If your files are too large to be send by e-mail, you can use SURFfilesender.
-
Application forms
Did you forget your password and do you want to request a new one? Do you want to modify storage for a workgroup, including access rights? Or do you want to submit another request for our ICT services or products? Please use the forms below.
-
Teaching academic integrity
Within all bachelor’s and master’s programmes, depending on the type of programme, attention is paid to ensuring that academic research is carried out scrupulously. For each programme, this is done in a way that is appropriate for the discipline in question.
-
Check it: work privacy and security smart
We can all do our bit to keep our information and personal data safe. It’s easier than you think and is often about the small things. Working privacy and security smart means protecting your own data and that of your colleagues. Want to know how best to go about that? Check it out here!
-
Workshops and training courses
Why do I have to keep entering a code to log in? How can I be sure that I am keeping my workplace safe? How can I identify phishing emails? And how do I know if something is a data breach?
-
Privacy and security officers
You can contact the privacy or security officers with questions about privacy or data security.
-
Lock your screen
Locking your screen before leaving your desk: it’s so easy to do but we often forget. This quick action protects both you and the university. Do you always lock your screen when you leave to get a coffee, walk to the printer or chat with a colleague in the corridor?
-
Education Dashboard
Leiden University’s Education Dashboard contains key data for all the university’s degree programmes. Please note that at present the dashboard is only available in Dutch. For more information see the Dutch staff website or send an email to cijfers@bb.leidenuninv.nl.
-
RELIANCE: Hands-on Training School on ASTRA Toolbox and Dynamic Imaging
Course
-
Report incidents and accidents
What are you supposed to do if something goes or has gone wrong? Whether it be a break-in, an accident or an unsafe situation of any other kind, or data breach or cyber-attack; please read how to report each type of incident below.
-
CWTS Scientometrics Summer School (CS3)
Research
-
Activating and managing your account
You can activate and manage your account via Account Services. To make the best use of Account Services, it is important that you set your account properly the first time you use it.
-
Tuesday Talks: Science Insights | 3 September 2024
Lecture, Tuesday Talks: Science Insights
-
Security
All university locations and buildings are monitored and fitted with cameras. Read on to find out where to get advice about security for a building, person or event that may be at higher risk.
-
ORCID iD and DOI
An ORCID iD is a unique code that identifies you as a scientist in a reliable and consistent way, much like the social security number in a passport. DOI does the same but for a scientific publication instead of a person. DOI and ORCID iD are examples of persistent identifiers.
-
(Personal) mobile devices
If you have a mobile device such as a smart phone or tablet that you purchased privately but also use for work-related purposes, it is important that you save your documents securely and deal responsibly with confidential information.
- More information about cooperating with China
-
Phishing
We all occasionally receive an email from an unknown sender, with content we weren’t expecting or that raises our suspicions in some other way. This is usually a fake email, also known as a phishing email. In fact, there are various types of phishing: it can also be done over the phone.
- More information about cooperating with China
-
Writing non-scientific parts
Funders are increasingly asking for more information than simply a research plan for a research proposal. On this page you will find an overview of resources that will help you compile this information efficiently when preparing your proposal. Some very important considerations to take into account…
-
Visualizing Science Using VOSviewer
Research
-
Frequently asked questions about privacy and security
Veelgestelde vragen privacy en security
-
AI in education
The latest generation of artificial intelligence (AI) can use natural language to answer complex questions and tasks. OpenAI launched the ChatGPT chatbot in late 2022. This has caused a stir in the world of education and is a cause of concern for many. What could AI in general and ChatGPT in particular…
-
LaTeX
LaTeX is a system for document preparation. It gives the user control over typesetting, references, complex formulas, and more. It is widely used in communication and publication of scientific documents in many fields.