Publications
Year
Author
- Adam Elbourne (2)
- Annemiek Verrips (2)
- Johannes Bollen (2)
- Krista Hoekstra (2)
- Rob Aalbers (2)
- Anne Marieke Braam (1)
- Annette Zeilstra (1)
- Bas Straathof (1)
- Bastiaan Overvest (1)
- Bert Smid (1)
- Frits Bos (1)
- Gerbert Romijn (1)
- Gerdien Meijerink (1)
- Hugo Rojas-Romagosa (1)
- Kan Ji (1)
- Karel Boxhoorn (1)
- Katarzyna Grabska (1)
- Leon Bettendorf (1)
- Ona Ciocyte (1)
- Peter Zwaneveld (1)
- Rinske Windig (1)
- Rob Luginbuhl (1)
- Roel van Elk (1)
- Sander Hoogendoorn (1)
- Tatiana Kiseleva (1)
- Show all
Type
The circular economy of plastics: from raw materials to waste
The circular economy aims to reduce the use of raw materials, promote re-use and recycling and limit waste. This study focuses on the circular economy of plastics and investigates what the major problems are in relation to the use of plastics and to what extent government policy is necessary and effective. →
Assets and liabilities of Dutch non-financial firms
Cost-benefit analysis for flood risk management and water governance in the Netherlands: an overview of one century
The Netherlands is a global reference for flood risk management. This reputation is based on a mix of world-class civil engineering projects and innovative concepts of water governance. For more than a century, cost-benefit analysis has been an important tool for both flood risk management as well as water governance in the Netherlands. It has helped to select the most effective and efficient flood risk projects and to coordinate and reconcile the interests of various policy areas, levels of government and private stakeholders. →
Study of cost-benefit analysis for e-government
Cyber Security Risk Assessment (CSRA) for the Economy
Society is digitising. The five most valuable companies in the world are ICT companies. The Dutch population makes extensive use of the Internet, and the government is also focusing increasingly on the use of digital means. This digitisation also involves an increase in the economic importance of cyber security. →