
Application of the perception model
In what concerns the model’s application in a threat analysis context, the threat is the undesirable behaviour, while the three components of the TPB (attitudes,
In what concerns the model’s application in a threat analysis context, the threat is the undesirable behaviour, while the three components of the TPB (attitudes,
In order to successfully identify perception derived threats, one must understand which ‘perceptions’ fuel certain behaviours that could potentially be classified as ‘threatening.’ Whereas in
1. General reflections on the technical process/es being explored Note: This could be a single technical process or a set of processes together if they
Taking our point of departure as the designing and development of data analysis algorithms, we need to keep in mind that most of the MIRROR
What do we mean by Human Rights Implications Checklist? For whom has this checklist been compiled? The intention of the task leading to the development
Step 1 – Initiation Verify if a DPIA is necessary. A DPIA is necessary if the data processing activity conducted with the MIRROR tool falls
Train the staff that operates the MIRROR tool on the basis of legal, ethical and human rights standards; Do not take any decisions that might
The following insights refer to the design and implementation of initiatives focused on migrants: More attention should be given to information collection – Many sources
Social media, accessible through mobile devices, have fundamentally reshaped migration networks and facilitated migration. Besides gaining vital information through communicating with known or unknown contacts
Migration is a continuous and complex process, in which migrants and refugees take available information into account at various points in time and re-evaluate their
Migration-Related Risks Caused by Misconceptions of Opportunities and Requirement
© All rights reserved