Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
- Utrecht University
- Delft University of Technology (TU Delft)
- University of Amsterdam (UvA)
- Wageningen University & Research
- University of Twente
- Erasmus University Rotterdam
- Eindhoven University of Technology (TU/e)
- Maastricht University (UM)
- University of Twente (UT)
- Delft University of Technology
- Eindhoven University of Technology
- Erasmus MC (University Medical Center Rotterdam)
- KNAW
- University Medical Centre Groningen (UMCG)
- Wetsus - European centre of excellence for sustainable water technology
- 5 more »
- « less
-
Field
-
protection strategies with inclusive governance models, this research project seeks to reconcile heritage security with social justice and participatory tourism development. This PhD position (DC-8) is
-
, religious or ethnic background, gender, sexual orientation, disability or age. We strive to create a safe and inclusive environment in which everyone can flourish and contribute. Knowledge security screening
-
, gender, sexual orientation, disability or age. We strive to create a safe and inclusive environment in which everyone can flourish and contribute. Knowledge security screening can be part of the selection
-
and contribute. Knowledge security screening can be part of the selection procedures of academic staff. We do this, among other things, to prevent the unwanted transfer of sensitive knowledge and
-
. A knowledge security check can be part of the selection procedure (for details: national knowledge security guidelines ) Where to apply Website https://www.academictransfer.com/en/jobs/357928/phd
-
, sexual orientation, disability or age. We strive to create a safe and inclusive environment in which everyone can flourish and contribute. Knowledge security screening can be part of the selection
-
, Fisheries, Food Security and Nature. Positive animal welfare is a prerequisite for the existence of zoos and their unique role in the conservation of endangered species. Animals must be able to exhibit
-
occurs; and validating these approaches against community and industry benchmarks. The work combines network measurements, data science, and systems security, with an emphasis on reproducibility and real
-
contribute. Knowledge security screening can be part of the selection procedures of academic staff. We do this, among other things, to prevent the unwanted transfer of sensitive knowledge and technology. If
-
everyone can flourish and contribute. Knowledge security screening can be part of the selection procedures of academic staff. We do this, among other things, to prevent the unwanted transfer of sensitive