This thesis has found a balance between individual data protection rights and the free flow of data. On the one hand, this balance serves to protect the individual and his data. On the other hand,... Show moreThis thesis has found a balance between individual data protection rights and the free flow of data. On the one hand, this balance serves to protect the individual and his data. On the other hand, health care and health research must take place using personal data.A balanced approach can be found in the following four ways. Firstly, a broad(-er) interpretation of the lawful basis of consent can facilitate secondary health research. Secondly, the use of other lawful bases can be a solution for the legitimation of secondary health research. Furthermore, a separate legal ground for secondary research can be a solution to resolve the issue of a lawful basis for health research.Thirdly, a balance can be found in the individual’s autonomy vis-à-vis the accountability of the health institution and the attention drawn to the free flow of data. The focus is shifted from the individual’s control over his data towards the health institution with other lawful bases than consent and a fair balance between data protection rights and the free flow of data.Fourthly, a risk-based approach to monitoring compliance contributes to balancing the rights and interests of individuals with data sharing for health care and research. Show less
This thesis described the further development of the controlled human hookworm model and several applications of this model. First, the hookworm egg excretion is modelled over time using Bayesian... Show moreThis thesis described the further development of the controlled human hookworm model and several applications of this model. First, the hookworm egg excretion is modelled over time using Bayesian statistics, resulting in the description of a plateau phase in egg output. Repeated infections a re then investigated as a means to improve the accuracy and statistical power of this output as an outcome measure. The hereby established model is then applied in an immunization study, which shows that it is possible to develop a protective response against short-term larval infection. The skin phase and IgG1 seem to play a role in the development of this protection. Furthermore, gut microbiome changes during controlled hookworm infection are described. Also, volunteers’ motivations and decision making process are investigated, resulting in the characterization of controlled human infection participants as ‘deliberate decision-makers’ and not ‘money-oriented risk-takers’. Following up on the findings in the study described, the importance of a multidisciplinary approach for the improvement of controlled human infection trials is argued in the discussion, with several recommendations made for further collaborative efforts in order to maximise social and scientific output of these studies. Show less
Dental calculus. This small, hard, inconspicuous substance that forms on the teeth of humans and animals contains a surprising amount of information about our lives. During its formation and growth... Show moreDental calculus. This small, hard, inconspicuous substance that forms on the teeth of humans and animals contains a surprising amount of information about our lives. During its formation and growth as a living biofilm, it accumulates a wide variety particles, especially bacteria and food debris.What makes this so interesting to archaeologists is that, when plaque hardens and forms dental calculus, these particles become trapped and well-protected against removal and degradation during hundreds to thousands of years, preserving a picture of past activities.The major problem—one of the major problems, for there are several—one of the many major problems is that this picture was never a complete picture of a lifetime of activities, and that picture fades over time. We know that these problems exist and that they limit our interpretations of past activities. What we need to do is approach these problems at a fundamental level. In my dissertation I introduce a protocol for growing artificial dental calculus. Working with a very controlled model allows me to explore the influence of a wide range of factors that may affect the uptake of particles into dental calculus, and better explain why and how our picture is incomplete. Show less
Tuberculosis (TB) is associated with 1.5 million deaths annually. There is a need exists to optimize both current as well as novel antibiotic combination treatment strategies to improve the... Show moreTuberculosis (TB) is associated with 1.5 million deaths annually. There is a need exists to optimize both current as well as novel antibiotic combination treatment strategies to improve the effectiveness and safety of treatments against TB. This PhD thesis has described how various quantitative pharmacology modeling approaches can contribute to the further development and optimization of both existing and novel therapies and treatment strategies against TB. Show less
Lung cancer is the leading cause of cancer death in the Netherlands. For years chemotherapy was the only (palliative) treatment, with a short survival of only months. Since the introduction of... Show moreLung cancer is the leading cause of cancer death in the Netherlands. For years chemotherapy was the only (palliative) treatment, with a short survival of only months. Since the introduction of immunotherapy in 2015, this survival has increased significantly, with the first results showing a survival of even a few years. However, the response rate is relatively low, the treatment is expensive and the (low percentage of) side effects are severe. Therefore a biomarker is needed to predict which patients would benefit of immunotherapy.This thesis is about the search for a new biomarker. With the use of the RNA of platelets, proteins, tumor markers in blood and a an electronic nose for exhaled breath, we tried to find a non-invasive biomarker for the prediction of response on immunotherapy and for the (future) use in clinical practice, some of which are promising. Show less
This thesis contains several investigations into the contribution of complement proteins, especially C1q, in several human diseases. Additionally, human autoantibodies against C1q (anti-C1q) are... Show moreThis thesis contains several investigations into the contribution of complement proteins, especially C1q, in several human diseases. Additionally, human autoantibodies against C1q (anti-C1q) are studied, cloned and characterized in order to further the understanding of their role in autoimmune disease. Show less
In this dissertation, I draw on twelve months of ethnographic fieldwork with Egyptians in Amsterdam to study how the nationalization of our imagination and social-legal and material infrastructures... Show moreIn this dissertation, I draw on twelve months of ethnographic fieldwork with Egyptians in Amsterdam to study how the nationalization of our imagination and social-legal and material infrastructures mediates social life. I describe how, just like the group of people categorized as Egyptian in Amsterdam is diverse, the Dutch state is too, consisting of a a range of images, laws, organizations, and people that embody them. I argue that this Dutch state multiple structures almost all aspects of life, but ultimately cannot define who we are, or what we do. Show less
The research presented in this thesis concerns one of the most important questions in software engineering of our time: how can we make sure that software is free from memory safety bugs? Memory... Show moreThe research presented in this thesis concerns one of the most important questions in software engineering of our time: how can we make sure that software is free from memory safety bugs? Memory safety bugs are the major cause of common vulnerabilities and exposures, and their presence threatens the stability and security of our digital world. This question is so important that it has escalated to the highest level. In a recent White House press release (February 26, 2024), the National Cyber Director of the United States of America calls on the academic community to help solve this hard problem: “addressing [this challenge] is imperative to ensuring we can secure our digital ecosystem long-term and protect the security of our Nation.” The accompanying technical report advises on the use of memory safe programming languages, and prominently mentions formal methods as one way to achieve the highly desired freedom from bugs, including memory safety bugs.In this thesis, formal methods are studied that are used to analyze software for its correctness, where correctness means that software satisfies its specification and incorrectness means the presence of a bug. The focus is on separation logic, a formal method designed as a scalable technique in ensuring freedom from memory safety bugs. Nowadays, separation logic is a well-established field of research: it has been widely studied academically in the past twenty years, and is successfully applied on an industry-wide scale to ensure memory safety. For example, separation logic is the technique used to prove, with mathematical certainty, that memory safe programming languages (such as Rust and Go) indeed live up to the promise that “they offer a way to eliminate, not just mitigate, entire bug classes.”In two parts, this thesis presents important scientific contributions that fill a gap in the academic literature. The first part contains the missing completeness theorem for separation logic, that is on par with the fundamental result by Goedel for first-order logic. Completeness is important for any formal method as it shows that the formal method can be adequately used for demonstrating every validity. The second part finally introduces dynamic separation logic that gives an alternative way to analyze memory safety problems, such that now it is possible to prove elementary specifications without needing extra logical techniques. This is important because it ensures ‘backwards compatibility’ with automated reasoning techniques that are optimized for first-order logic. Show less
The use of opioid is increasing in the Netherlands, which is reflected in an increase in complications associated with the use, such as hospital admission and death due to opioid poisoning. In... Show moreThe use of opioid is increasing in the Netherlands, which is reflected in an increase in complications associated with the use, such as hospital admission and death due to opioid poisoning. In addition to these direct hazards of opioid use, patients also face the risk of unplanned ICU admission and all-cause mortality. Dependent on socio-demographic characteristics and co-morbidities the risk of theseoutcomes may vary, but is unique to the general population of the Netherlands when compared to other countries. Show less
Visualizing the internal structure is a crucial step in acquiring knowledge about the origin, state, and composition of cultural heritage artifacts. Among the most powerful techniques for exposing... Show moreVisualizing the internal structure is a crucial step in acquiring knowledge about the origin, state, and composition of cultural heritage artifacts. Among the most powerful techniques for exposing the interior of cultural heritage objects is computed tomography (CT), a technique that computationally forms a 3D image using hundreds of radiographs acquired in a full circular range. The diversity in materials, shapes and sizes of cultural heritage objects poses a challenge for the broad application of this technique, since each scan needs to be tailored to the object. Moreover, the lack of affordable and versatile CT equipment in museums, combined with the challenge of transporting precious collection objects, currently keeps this technique out of reach for most cultural heritage applications. In this thesis, we explore how CT imaging can be further integrated in cultural heritage applications by 1) integrating expert feedback into the data acquisition process, 2) tailoring acquisition methods to obtain specific information, 3) developing a low-cost method to use in-house X-ray facilities for 3D CT imaging and 4) providing tools to interactively visualise and inspect the CT data. Show less
The endocannabinoid receptors CB1R and CB2R are involved in a plethora of processes, and consequently are involved in many pathological conditions. Their wide distribution makes the CBRs both an... Show moreThe endocannabinoid receptors CB1R and CB2R are involved in a plethora of processes, and consequently are involved in many pathological conditions. Their wide distribution makes the CBRs both an interesting therapeutic target and hard to study. Additional chemical tools are required to study and understand the function and mechanism of CB1R and CB2R. This thesis describes the development of several such tools to improve our insight in the (pathological) roles of the receptors in order to develop novel and improved therapeutics. First evaluation of three dimensional ligand-CB2R complexes made and analysed with Cryo-EM are described. Hotspots that potentially generate selectivity between CB1R and CB2R are evaluated with point-mutations in vitro. Consequently describes the development of the first tools, two-step bifunctional probes based on LEI-121 and LEI 102, is described. As two-step probes are not compatible with every assay, the toolbox is expanded with a one-step fluorescent probe. Briefly touching upon CB1R, ligands were designed with negatively charged phosphonium groups that are potentially selective for mtCB1R. Show less
Malaria continues to wreak havoc in tropical regions, due largely to the lack of an effective vaccine. Vaccine candidates based on whole parasites have shown promising results in malaria-naïve... Show moreMalaria continues to wreak havoc in tropical regions, due largely to the lack of an effective vaccine. Vaccine candidates based on whole parasites have shown promising results in malaria-naïve individuals, but their potency in malaria-exposed individuals is considerably lower. This dissertation described the development of a chemical strategy for boosting such parasites’ potency in pursuit of more efficacious malaria vaccines for use in endemic areas.Chapter 2 outlined the adaptation of a method for chemically modifying microbial cell surfaces.Chapter 3 showed the chemistry underlying this modification system to be stably compatible with in vivo usage.Chapter 4 demonstrated that when the chemical modification system was used to introduce immune-potentiating agents onto bacteria, better immune responses ensued.Chapter 5 tied it all together by using the chemical modification system to potentiate malaria parasites, and showed that doing so markedly improved immune responses in an in vivo immunization model.Chapter 6 summarized these findings in the context of malaria vaccine development and posited next steps forward. Show less
The dissertation investigates the role of lexical tone in spoken word recognition and production. In particular, it focuses on three groups of speakers: native speakers of Standard Chinese, bi... Show moreThe dissertation investigates the role of lexical tone in spoken word recognition and production. In particular, it focuses on three groups of speakers: native speakers of Standard Chinese, bi-dialectal speakers of Standard Chinese and Xi’an Mandarin, and bilingual speakers of Standard Chinese and English. Through a series of experiments employing the eye-tracking visual world paradigm and the picture-word interference paradigm, four key issues were explored: the role of lexical tone in Mandarin spoken word recognition; tonal interference in bi-dialectal spoken word recognition; the activation of lexical tone in bilingual spoken word production; and the influence of lexical tone on the bilingual mental lexicon. The findings of this dissertation not only showed how Mandarin listeners utilize tonal information during tone word recognition but also revealed dynamic tonal interaction between language systems. Overall, this dissertation contributes to a deeper understanding of lexical access by highlighting the significant role of lexical tone in both monolingual and bilingual contexts, shedding light on the intricate processes involved in spoken word recognition and production across languages. Show less
During the Cold War, the Dutch Army Medical Service (MGD) promoted the health and operational readiness of the Royal Netherlands Army. Medical war preparations were an integral part of this. The... Show moreDuring the Cold War, the Dutch Army Medical Service (MGD) promoted the health and operational readiness of the Royal Netherlands Army. Medical war preparations were an integral part of this. The evacuation, treatment and nursing of sick and wounded soldiers in wartime required the formulation of procedures and doctrines as well as an extensive organization, complete with supplies and equipment, trained personnel and mobilization plans. However, these activities were shrouded in uncertainty as the prospect of biological, chemical or even nuclear warfare called into question all casualty estimations based on previous conflicts.The central question in this dissertation is how the MGD dealt with the nuclear threat perception and how military-medical war preparations were influenced by it. Against the backdrop of the ominous prospects of future warfare, military physicians tried to legitimize their war preparations and make sense of them. This mechanism is made clear using the concept of sociotechnical imaginaries: constructed optimistic images of the future that are based on the collective belief in scientific and technological progress. This study shows that the MGD maintained an optimistic outlook from the beginning through the end of the Cold War, but the reasoning that supported this viewpoint evolved over time. Show less
Cancer immunotherapies utilizing immune checkpoint blockade (ICB) therapy targeting CTLA-4 and PD-1/PD-L1 relieve tumor-induced immune suppression and induce durable tumor regression. The use of... Show moreCancer immunotherapies utilizing immune checkpoint blockade (ICB) therapy targeting CTLA-4 and PD-1/PD-L1 relieve tumor-induced immune suppression and induce durable tumor regression. The use of ICB therapy have demonstrated remarkable therapeutic efficacy in a proportion of patients with melanoma. However, still a substantial percentage of patients does not respond (durable) to ICB treatment and many questions remain. Therefore, in this thesis, the aim is to improve our understanding of ICB efficacy. We demonstrate the promise of neoadjuvant ICB therapy (approach in which ICB therapy is applied before surgery) and analyze different cohorts of melanoma patients. This results in the identification of several markers that are associated with prognosis, including IFN-y related gene signature score, Batf3 dendritic cell associated gene signature score, tumor mutational burden and systemic LRG1 expression. These markers can potentially be targeted and might facilitate rational combination therapies that can boost the efficacy of ICB therapy. For this purpose, we perform a repurposing compound screen that targets antigen cross-presentation. Togethers, this work increases our understanding of factors that determine ICB therapy efficacy and toxicity, with the goal to identify novel strategies to improve outcome of melanoma patients in a rationale and personal manner. Show less
In this thesis we examined patient readiness for shared decision making (SDM) about treatment. We first assessed associations between patient-related characteristics and the occurrence of SDM.... Show moreIn this thesis we examined patient readiness for shared decision making (SDM) about treatment. We first assessed associations between patient-related characteristics and the occurrence of SDM. Overall, we did not find consistent associations between characteristics such as age or education level, and the extent to which SDM occurred (measured from the perspective of patients, clinicians, or observers). Second, we assessed what patients need to be ready, i.e., enabled and well-equipped, to participate in SDM about treatment. We identified a wide range of skills, cognitions, and emotions. For instance, patients need to be able to understand the relevant information, be able to and dare to express themselves in consultations with clinicians, and experience an adequate amount of time to talk to clinicians and to consider the options. Finally, we developed a questionnaire, the ReadySDM. The aim of the ReadySDM is to retrospectively measure the extent to which patients felt ready for SDM during a treatment decision-making process. The questionnaire has the potential to identify novel insights into patients’ support needs and ways to enhance SDM in daily practice. Show less
In between 1968 and 1973, the Dutch Atlantic was home to four Black Power organizations: the Black Panthers of Curaçao (1968-1970), Antillean Black Power (1969-1970), the Dutch Black Panther... Show moreIn between 1968 and 1973, the Dutch Atlantic was home to four Black Power organizations: the Black Panthers of Curaçao (1968-1970), Antillean Black Power (1969-1970), the Dutch Black Panther Solidarity Committee (1969-1970), and Black Power Suriname / Afro-Sranan (1970-1973). This dissertation asks why and how these organizations aligned with the transnational movement. Based on archival research conducted in Curaçao, Suriname, the United States, and the Netherlands, it argues that they did so because Black Power offered them an alternative path to decolonization. Instead of striving for equal participation in the Kingdom of the Netherlands, as colonial reformists did, or promoting self-reliance, as nationalists did, Black Power activists believed the best way to free themselves from the legacies and realities of colonialism was to join the movement's global network of Black solidarity, cooperation, and unity. Show less
Online behavioral advertising (OBA) is a form of advertising that relies on data about users’ behavior (e.g., clicks, likes, voice commands) and uses artificial intelligence (AI) to place ads that... Show moreOnline behavioral advertising (OBA) is a form of advertising that relies on data about users’ behavior (e.g., clicks, likes, voice commands) and uses artificial intelligence (AI) to place ads that users may be interested in. Ads that AI chooses to display often leave users in awe and concern them about the potential of total surveillance. People using these services have (legitimate) expectations that tech companies or democratic institutions protect their interests. Indeed, the European Union (EU) heavily regulates OBA, requiring, for example, that companies have users’ consent before their surveillance. Yet, these ads monetize most “free” online services and turn companies like Alphabet and Meta into the world’s wealthiest. Therefore, the industry is incentivized to acquire consumers’ consent by any means necessary, often through manipulation. As almost everyone has encountered manipulative “cookie banners” online, many have started to doubt if EU law can effectively protect consumers from the growing power of the tech industry. This thesis builds a framework of manipulation, describes consumer manipulation via OBA, constructs a theory of the harms of this phenomenon, and analyses its boundaries in the EU legal framework. The thesis concludes that the EU framework can effectively safeguard consumers, anticipating that the enforcement of the Digital Services Act (DSA) and the Digital Markets Act (DMA) will put an end to consumer manipulation (and exploitation) via OBA. Show less
Security is something that people tend to care about. But is it also something that they should care about? To explore this question, this dissertation first develops a new conceptual framework of... Show moreSecurity is something that people tend to care about. But is it also something that they should care about? To explore this question, this dissertation first develops a new conceptual framework of security. Next, it analyses how security relates to some key values for liberal democratic societies. The first of these is well-being. It is argued that there are important ways in which security can contribute to somebody’s well-being – but there are also ways in which security may hamper a person’s flourishing. The second value is freedom. It is shown that in public decision-making freedom and security may come at each other’s cost – yet there are also ways in which the two can work to each other’s benefit. The third value is equality. It is demonstrated that in order for a society to meet the demands of equality it must provide its members with a particular set of securities – while at the same time the pursuit of equality puts another set of securities out of reach. Ultimately, this dissertation finds no reason for considering security to be good for its own sake, but it argues that security can be good for the sake of well-being, freedom, and equality. Show less
This thesis summarizes a PhD research project, in which we successfully developed and tested a smartphone-based version of the AAT. We used the mobile AAT to show that approach-avoidance tendencies... Show moreThis thesis summarizes a PhD research project, in which we successfully developed and tested a smartphone-based version of the AAT. We used the mobile AAT to show that approach-avoidance tendencies can undergo substantial state-like changes. We further demonstrate how these changes can be systematically related to other state-variables and how important health-related outcomes such as overweight and obesity, can be explained by disruptions of these dynamics. Our findings have broad implications for approach-avoidance research and task-based research in general, as they reveal how smartphones can be used to get insights into the dynamic nature of task outcomes and how (disruptions of) these dynamics can have important real-life consequences. Show less