Talent Leadership Scan
ICT & Software Engineering
Client company:Lectoraat Dynamische Talentinterventions Group
Monika Kerulyte
David Chang
Lei Zheng
Sam Boers
Stefan Rachev
Project description
To achieve better results and to make the research more focused towards specific goals and topics, research questions that align with project goals were derived for this project. The main question of the project is “How can application be expanded by ensuring data privacy and security.”
To answer those questions, they were broken down into sub-research questions that answer underlying problems of the main question. Each sub-question will be answered by using DOT research framework strategies and methods. Table 2 below presents those questions and the research strategies and methods that aid in answering them.
One of the sub-questions focused on exploring and understanding the current GDPR laws and regulations in terms of how to handle user data as well as how each new feature may affect data privacy and whether any special measures or adjustments are necessary.
The second sub-question focuses on investigating best practices and industry standards for implementing role-based access control systems as well as what are the specific responsibilities and permissions associated with each new user role.
Context
This project is authored by Rachel Verheijen and Marian Thunissen, both of whom are researchers at Fonty Hogescholen. More precisely, they are part of a dedicated research group within the university called the Lectoraat Dynamische Talentinterventies, which focuses on talent management and development in professional settings. This research initiative's fundamental objective is to support environments where people can identify, develop, and use their natural talents to contribute to the workplace in meaningful and significant ways. In a broader sense, this means ensuring that everyone has the chance to work in environments where their talents can flourish.
The main problem the talent-oriented leadership scan currently faces is the insufficiency of features and functionality, which contribute to a lack of effectiveness in gathering research data, security, privacy, and what kind of insight respondents can receive from the platform.
Results
- We added authentication/authorization with JWT token. In total there are 3 different roles: Admin, Researcher, Researcher Assistant.
- Admin can see a list of registered users, add new users, update or delete existing users.
- Registered users can see their details and reset password.
- Added NL/EN language options for static website content.
About the project group
All of our group members have specialization in Cyber Security and currently doing 6th or 7th semester. Half of the group is starting Graduation internship with next semester. Our project took 5 months to complete. We worked in Scrum, switching who is going to be scrum master every sprint.