Home
Workshops
Security assessment
Resources
Learn more
Blog
DSE
Hipster
Events
Team
Contact
Home
Workshops
Security assessment
Resources
Blog
Events
Team
Contact
DSE
Hipster
Hipster
Hipster
· 11 September 2023
Decoding Risk in the Digital Age: What You Need to Know
Security and privacy problems are not just hackers. Overlooked everyday risks can multiply fast!
Read more...
Hipster
· 08 March 2023
Hipster Impact Case Study: Spark
How the HIPSTER project helped one dynamic startup company to tackle cyber.
Read more...
Hipster
· 02 February 2023
Cyber Risk Management is an Innovation Process
How the concept of Absorptive Capacity can help us get value out of cybersecurity in product innovation.
Read more...
Hipster
· 12 December 2022
Why Agile Fails
Agile research projects need a minimal project manager role to act as customer.
Read more...
Hipster
· 08 May 2022
Making Sense of Open Codes
A key output of open coding is an huge number of open codes. How are you to make sense out of that seeming chaos?
Read more...
Hipster
· 20 March 2022
Using Teamwork for Open Coding
Is double open coding possible? Here in the Hipster project, we have found that not only is the answer ‘yes’, but also that the benefits are considerable. Read on to learn why.
Read more...
Hipster
· 09 February 2022
Experiences from the Dark Side of Participant Recruitment
The Do's and Don'ts of Cold Calling for Research
Read more...
Hipster
· 07 January 2022
How to Do Agile Research
Yes! We can indeed use Agile methods to run an academic research project.
Read more...
Hipster
· 04 October 2021
Research as It Happens: Bootstrapping into a New Project
Charles explores the art of creating a literature survey.
Read more...
Scroll to top