SlideShare a Scribd company logo
1 of 17
CRISP Evaluation
16th of March 2017, CoU Meeting, Brussels
Dr Nathalie Hirschmann
(Center for Technology and Society – Technische Universität Berlin)
EVALUATION
CRISP Methodology
Source: Deliverable 5.2. February 2016
Information provider
Audit and
Inspection
review &
decision
Auditor (third party)
EVALUATION CERTIFICATION
SurveillanceAttestation
S-T-E-Fi
Assessment
Configuration
selection and
determination
R3R2
R1
2
Systematisation of
criteria
Video surveillance
3
performance
accuracy
robustness
fair distribution
accountability
withdrawal mechanisms
end user safety
system interference
risk
user error protection
environment
awareness
transparent use
feeling of uneasiness
physiological invasiveness
reliability
maintenance resources
usability
ethical codes
good practice/safety codes
documentation protective measures to ensure efficiency
usability
user manual
customisation
interoperability
lifecycle costs
energy efficiency
personal data
prohibition of discrimination
due process
Systematisation of
criteria
Video surveillance
4
performance
accuracyrobustness
SECURITYfair distribution
accountability
withdrawal mechanismsend user safety
system interference
risk
user error protection
environment
awareness
transparent use
TRUST
feeling of uneasiness
physiological invasiveness
reliability
maintenance resources
usability
ethical codesgood practice/safety codes
documentation
protective measures to ensure efficiency
usability
user manual
customisation
EFFICIENCYinteroperability
lifecycle costs
energy efficiency personal data
prohibition of discrimination
due process
FREEDOM
INFRINGEMENT
Video surveillance
5
SECURITY TRUST
EFFICIENCY
INFRINGEMENT
FREEDO
M
S-T-E-Fi experts
‘Information provider’
S-T-E-FI ASSESSMENTCONFIGURATION
R1 R2
C
E
R
T
I
F
I
C
A
T
I
O
N
10
Evaluation process
Video surveillance
‘Information provider’
S-T-E-FI -ASSESSMENTCONFIGURATION
R2
1. Specification of the
security area
Client informs about:
2. Detailed technical
specifications of
the system
3. Basic information
on at least three
application
scenarios
11
Evaluation process –
configuration
Video surveillance
1. Reliable answering
of all assessment
questions by the
project leader and
‘appointed experts’
2. Identifying conflicts
between and within
S-T-E-Fi
dimensions
3. Conflict resolution
R 1
‘Information provider’
S-T-E-FI -ASSESSMENT
12
Evaluation process – link between
configuration and assessment
Video surveillance
R 1
13
Evaluation process –
assessment
Video surveillance
‘Information provider’
S-T-E-FI -ASSESSMENT
R1
1. Reliable answering
of all assessment
questions by the
project leader and
‘appointed experts’
2. Identifying conflicts
between and within
S-T-E-Fi
dimensions
3. Conflict resolution
R 2
14
Assessment: report R2
R 2
 Summary of how the process was conducted
 Range of stakeholders involved
 Information gathered during configuration
 Selected assessment questions
 Results of the assessment questions
 Type and number of identified conflicts
 Conflict resolution
 Potentially remaining, unsolved conflicts
‘Information provider’
S-T-E-FI -ASSESSMENTCONFIGURATION
R1 R2
1. Specification of the
security area
Client informs about:
2. Detailed technical
specifications of
the system
3. Basic information
on at least three
application
scenarios
C
E
R
T
I
F
I
C
A
T
I
O
N
15
From evaluation to certification
Video surveillance
1. Reliable answering
of all assessment
questions by the
project leader and
‘appointed experts’
2. Identifying conflicts
between and within
S-T-E-Fi
dimensions
3. Conflict resolution
18
Assessment criteria –
example
“Yes” or “No”
Is the personnel trained
to increase public
awareness on the
possible impacts of the
system?
What kind of training
does the personnel
receive and how often?
QUESTIONS:
T R U S T
Awareness, Training
e.g. “Our personnel
is trained on the
system in the field
every year. This is
recorded in the
personnel files.”
19
Conflict identification –
example
RESPONSE
OPTIONS
NO YES
NO C- (0) C+ (1)
YES C- (0) C- (0)
Criterion A: ‘Observability’ (T)
‘Are people constantly observed by the system?’
Criterion B:
‘Transparency’ (T)
‘Is the system clear
on what it offers?’
C – (0): no conflict; C+ (1): conflict; needs to be
addressed.
24
Identification of conflicts
25
Conflict resolution
1. Ensuring compliance with applicable legal
requirements
2. Implementation of technical changes to the
security system and/or implementation of
changes to the applied operating procedures
3. Negotiating a solution by following a practical
and legitimate decision-making process
participation & systematisation:
enabling/encouraging early
stakeholder participation;
assessment criteria are
systematised according to four
dimensions
systemic view: transferring
assessment criteria into a
matrix structure; identifying
conflicts between/within
dimensions and making them
visible
conflict resolution: indicating
identified conflicts which need
to be solved to involved parties
in order to move on with
certification
S
Fi
T
E
27
CRISP’s approach
28
For further questions, please contact:
Dr. Leon Hempel
Zentrum Technik und Gesellschaft – TU Berlin
Hardenbergstr. 16-18
10623 Berlin – Germany
hempel@ztg.tu-berlin.de

More Related Content

What's hot

CRISP Work package 4 Key Outcomes
CRISP Work package 4 Key OutcomesCRISP Work package 4 Key Outcomes
CRISP Work package 4 Key OutcomesCRISP Project
 
RPAS related privacy and data protection: practical advice for RPAS users
RPAS related privacy and data protection: practical advice for RPAS usersRPAS related privacy and data protection: practical advice for RPAS users
RPAS related privacy and data protection: practical advice for RPAS usersTrilateral Research
 
OSIRIS_European Utility Week 2015 - Vienna (arrastrado)
OSIRIS_European Utility Week 2015 - Vienna (arrastrado)OSIRIS_European Utility Week 2015 - Vienna (arrastrado)
OSIRIS_European Utility Week 2015 - Vienna (arrastrado)Jose Angel Velasco
 
ARIES Project Presentation
ARIES Project PresentationARIES Project Presentation
ARIES Project PresentationNicolás Notario
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...IJNSA Journal
 

What's hot (6)

CRISP Work package 4 Key Outcomes
CRISP Work package 4 Key OutcomesCRISP Work package 4 Key Outcomes
CRISP Work package 4 Key Outcomes
 
RPAS related privacy and data protection: practical advice for RPAS users
RPAS related privacy and data protection: practical advice for RPAS usersRPAS related privacy and data protection: practical advice for RPAS users
RPAS related privacy and data protection: practical advice for RPAS users
 
OSIRIS_European Utility Week 2015 - Vienna (arrastrado)
OSIRIS_European Utility Week 2015 - Vienna (arrastrado)OSIRIS_European Utility Week 2015 - Vienna (arrastrado)
OSIRIS_European Utility Week 2015 - Vienna (arrastrado)
 
_Introduction_to_eu-LISA
_Introduction_to_eu-LISA_Introduction_to_eu-LISA
_Introduction_to_eu-LISA
 
ARIES Project Presentation
ARIES Project PresentationARIES Project Presentation
ARIES Project Presentation
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...
 

Similar to CRISP Evaluation of Video Surveillance Systems

Can Trust In Security TEchnologies be Enhanced through Certification?
Can Trust In Security TEchnologies be Enhanced through Certification?Can Trust In Security TEchnologies be Enhanced through Certification?
Can Trust In Security TEchnologies be Enhanced through Certification?CRISP Project
 
CompTIA Security+ Objectives
CompTIA Security+ ObjectivesCompTIA Security+ Objectives
CompTIA Security+ Objectivessombat nirund
 
Btpsec Sample Penetration Test Report
Btpsec Sample Penetration Test ReportBtpsec Sample Penetration Test Report
Btpsec Sample Penetration Test Reportbtpsec
 
How can i find my security blind spots ulf mattsson - aug 2016
How can i find my security blind spots   ulf mattsson - aug 2016How can i find my security blind spots   ulf mattsson - aug 2016
How can i find my security blind spots ulf mattsson - aug 2016Ulf Mattsson
 
RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™CPaschal
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical SecurityJorge Sebastiao
 
Developing a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanDeveloping a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanTripwire
 
Sec+ Organizational Security
Sec+ Organizational SecuritySec+ Organizational Security
Sec+ Organizational SecurityDavid Meltzer
 
Comptia security-sy0-401
Comptia security-sy0-401Comptia security-sy0-401
Comptia security-sy0-401pgupta101
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...abhichowdary16
 
CISSP Cheatsheet.pdf
CISSP Cheatsheet.pdfCISSP Cheatsheet.pdf
CISSP Cheatsheet.pdfshyedshahriar
 
A Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramA Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramGoogleNewsSubmit
 
Icssea 2013 arrl_final_08102013
Icssea 2013 arrl_final_08102013Icssea 2013 arrl_final_08102013
Icssea 2013 arrl_final_08102013Vincenzo De Florio
 
RAMNSS_2016_service_porfolio
RAMNSS_2016_service_porfolioRAMNSS_2016_service_porfolio
RAMNSS_2016_service_porfolioRhys A. Mossom
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubKaushal Trivedi
 
Cloud Security Demystified
Cloud Security DemystifiedCloud Security Demystified
Cloud Security DemystifiedMichael Torres
 
Sudarsan Jayaraman - Open information security management maturity model
Sudarsan Jayaraman  - Open information security management maturity modelSudarsan Jayaraman  - Open information security management maturity model
Sudarsan Jayaraman - Open information security management maturity modelnooralmousa
 
Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...
Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...
Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...CompTIA
 

Similar to CRISP Evaluation of Video Surveillance Systems (20)

Can Trust In Security TEchnologies be Enhanced through Certification?
Can Trust In Security TEchnologies be Enhanced through Certification?Can Trust In Security TEchnologies be Enhanced through Certification?
Can Trust In Security TEchnologies be Enhanced through Certification?
 
CompTIA Security+ Objectives
CompTIA Security+ ObjectivesCompTIA Security+ Objectives
CompTIA Security+ Objectives
 
Btpsec Sample Penetration Test Report
Btpsec Sample Penetration Test ReportBtpsec Sample Penetration Test Report
Btpsec Sample Penetration Test Report
 
How can i find my security blind spots ulf mattsson - aug 2016
How can i find my security blind spots   ulf mattsson - aug 2016How can i find my security blind spots   ulf mattsson - aug 2016
How can i find my security blind spots ulf mattsson - aug 2016
 
RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™
 
CERT Certification
CERT CertificationCERT Certification
CERT Certification
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
Developing a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanDeveloping a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action Plan
 
Sec+ Organizational Security
Sec+ Organizational SecuritySec+ Organizational Security
Sec+ Organizational Security
 
Comptia security-sy0-401
Comptia security-sy0-401Comptia security-sy0-401
Comptia security-sy0-401
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
CISSP Cheatsheet.pdf
CISSP Cheatsheet.pdfCISSP Cheatsheet.pdf
CISSP Cheatsheet.pdf
 
Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016
 
A Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramA Major Revision of the CISRCP Program
A Major Revision of the CISRCP Program
 
Icssea 2013 arrl_final_08102013
Icssea 2013 arrl_final_08102013Icssea 2013 arrl_final_08102013
Icssea 2013 arrl_final_08102013
 
RAMNSS_2016_service_porfolio
RAMNSS_2016_service_porfolioRAMNSS_2016_service_porfolio
RAMNSS_2016_service_porfolio
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
 
Cloud Security Demystified
Cloud Security DemystifiedCloud Security Demystified
Cloud Security Demystified
 
Sudarsan Jayaraman - Open information security management maturity model
Sudarsan Jayaraman  - Open information security management maturity modelSudarsan Jayaraman  - Open information security management maturity model
Sudarsan Jayaraman - Open information security management maturity model
 
Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...
Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...
Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...
 

Recently uploaded

RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptxRESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptxFarihaAbdulRasheed
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfAnalytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfSwapnil Therkar
 
‏‏VIRUS - 123455555555555555555555555555555555555555
‏‏VIRUS -  123455555555555555555555555555555555555555‏‏VIRUS -  123455555555555555555555555555555555555555
‏‏VIRUS - 123455555555555555555555555555555555555555kikilily0909
 
Gas_Laws_powerpoint_notes.ppt for grade 10
Gas_Laws_powerpoint_notes.ppt for grade 10Gas_Laws_powerpoint_notes.ppt for grade 10
Gas_Laws_powerpoint_notes.ppt for grade 10ROLANARIBATO3
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfSELF-EXPLANATORY
 
Speech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxSpeech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxpriyankatabhane
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxyaramohamed343013
 
Forest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are importantForest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are importantadityabhardwaj282
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxkessiyaTpeter
 
Cytokinin, mechanism and its application.pptx
Cytokinin, mechanism and its application.pptxCytokinin, mechanism and its application.pptx
Cytokinin, mechanism and its application.pptxVarshiniMK
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxSwapnil Therkar
 
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tantaDashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tantaPraksha3
 
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxLIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxmalonesandreagweneth
 
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCRCall Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCRlizamodels9
 
Evidences of Evolution General Biology 2
Evidences of Evolution General Biology 2Evidences of Evolution General Biology 2
Evidences of Evolution General Biology 2John Carlo Rollon
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Nistarini College, Purulia (W.B) India
 
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxMicrophone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxpriyankatabhane
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptxRESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfAnalytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
 
‏‏VIRUS - 123455555555555555555555555555555555555555
‏‏VIRUS -  123455555555555555555555555555555555555555‏‏VIRUS -  123455555555555555555555555555555555555555
‏‏VIRUS - 123455555555555555555555555555555555555555
 
Gas_Laws_powerpoint_notes.ppt for grade 10
Gas_Laws_powerpoint_notes.ppt for grade 10Gas_Laws_powerpoint_notes.ppt for grade 10
Gas_Laws_powerpoint_notes.ppt for grade 10
 
Engler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomyEngler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomy
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
 
Speech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxSpeech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptx
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docx
 
Forest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are importantForest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are important
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
 
Cytokinin, mechanism and its application.pptx
Cytokinin, mechanism and its application.pptxCytokinin, mechanism and its application.pptx
Cytokinin, mechanism and its application.pptx
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
 
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tantaDashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
 
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxLIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
 
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCRCall Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
 
Evidences of Evolution General Biology 2
Evidences of Evolution General Biology 2Evidences of Evolution General Biology 2
Evidences of Evolution General Biology 2
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...
 
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxMicrophone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
 

CRISP Evaluation of Video Surveillance Systems

  • 1. CRISP Evaluation 16th of March 2017, CoU Meeting, Brussels Dr Nathalie Hirschmann (Center for Technology and Society – Technische Universität Berlin)
  • 2. EVALUATION CRISP Methodology Source: Deliverable 5.2. February 2016 Information provider Audit and Inspection review & decision Auditor (third party) EVALUATION CERTIFICATION SurveillanceAttestation S-T-E-Fi Assessment Configuration selection and determination R3R2 R1 2
  • 3. Systematisation of criteria Video surveillance 3 performance accuracy robustness fair distribution accountability withdrawal mechanisms end user safety system interference risk user error protection environment awareness transparent use feeling of uneasiness physiological invasiveness reliability maintenance resources usability ethical codes good practice/safety codes documentation protective measures to ensure efficiency usability user manual customisation interoperability lifecycle costs energy efficiency personal data prohibition of discrimination due process
  • 4. Systematisation of criteria Video surveillance 4 performance accuracyrobustness SECURITYfair distribution accountability withdrawal mechanismsend user safety system interference risk user error protection environment awareness transparent use TRUST feeling of uneasiness physiological invasiveness reliability maintenance resources usability ethical codesgood practice/safety codes documentation protective measures to ensure efficiency usability user manual customisation EFFICIENCYinteroperability lifecycle costs energy efficiency personal data prohibition of discrimination due process FREEDOM INFRINGEMENT
  • 6. ‘Information provider’ S-T-E-FI ASSESSMENTCONFIGURATION R1 R2 C E R T I F I C A T I O N 10 Evaluation process Video surveillance
  • 7. ‘Information provider’ S-T-E-FI -ASSESSMENTCONFIGURATION R2 1. Specification of the security area Client informs about: 2. Detailed technical specifications of the system 3. Basic information on at least three application scenarios 11 Evaluation process – configuration Video surveillance 1. Reliable answering of all assessment questions by the project leader and ‘appointed experts’ 2. Identifying conflicts between and within S-T-E-Fi dimensions 3. Conflict resolution R 1
  • 8. ‘Information provider’ S-T-E-FI -ASSESSMENT 12 Evaluation process – link between configuration and assessment Video surveillance R 1
  • 9. 13 Evaluation process – assessment Video surveillance ‘Information provider’ S-T-E-FI -ASSESSMENT R1 1. Reliable answering of all assessment questions by the project leader and ‘appointed experts’ 2. Identifying conflicts between and within S-T-E-Fi dimensions 3. Conflict resolution R 2
  • 10. 14 Assessment: report R2 R 2  Summary of how the process was conducted  Range of stakeholders involved  Information gathered during configuration  Selected assessment questions  Results of the assessment questions  Type and number of identified conflicts  Conflict resolution  Potentially remaining, unsolved conflicts
  • 11. ‘Information provider’ S-T-E-FI -ASSESSMENTCONFIGURATION R1 R2 1. Specification of the security area Client informs about: 2. Detailed technical specifications of the system 3. Basic information on at least three application scenarios C E R T I F I C A T I O N 15 From evaluation to certification Video surveillance 1. Reliable answering of all assessment questions by the project leader and ‘appointed experts’ 2. Identifying conflicts between and within S-T-E-Fi dimensions 3. Conflict resolution
  • 12. 18 Assessment criteria – example “Yes” or “No” Is the personnel trained to increase public awareness on the possible impacts of the system? What kind of training does the personnel receive and how often? QUESTIONS: T R U S T Awareness, Training e.g. “Our personnel is trained on the system in the field every year. This is recorded in the personnel files.”
  • 13. 19 Conflict identification – example RESPONSE OPTIONS NO YES NO C- (0) C+ (1) YES C- (0) C- (0) Criterion A: ‘Observability’ (T) ‘Are people constantly observed by the system?’ Criterion B: ‘Transparency’ (T) ‘Is the system clear on what it offers?’ C – (0): no conflict; C+ (1): conflict; needs to be addressed.
  • 15. 25 Conflict resolution 1. Ensuring compliance with applicable legal requirements 2. Implementation of technical changes to the security system and/or implementation of changes to the applied operating procedures 3. Negotiating a solution by following a practical and legitimate decision-making process
  • 16. participation & systematisation: enabling/encouraging early stakeholder participation; assessment criteria are systematised according to four dimensions systemic view: transferring assessment criteria into a matrix structure; identifying conflicts between/within dimensions and making them visible conflict resolution: indicating identified conflicts which need to be solved to involved parties in order to move on with certification S Fi T E 27 CRISP’s approach
  • 17. 28 For further questions, please contact: Dr. Leon Hempel Zentrum Technik und Gesellschaft – TU Berlin Hardenbergstr. 16-18 10623 Berlin – Germany hempel@ztg.tu-berlin.de

Editor's Notes

  1. Copyright note: Re-use of information contained in this document for commercial and/or non-commercial purposes is authorised and free of charge, provided the source is acknowledged. The CRISP consortium does not accept responsibility for the consequences of errors or omissions herein enclosed. The CRISP consortium does not accept responsibility in connection with the use or re-use made of the information contained in this deliverable. This document is subject to updates, revisions, and extensions by the CRISP consortium. Address questions and comments to: crisp@nen.nl
  2. When we take security systems, for instance, video surveillance systems, a lot of aspects and notions arise that we need to talk about We came from a more broad approach and started to collect as many criteria related to security products, systems and services as possible; the sources we used were research project‘s observations results, legislation, and existing standards in the context of security Hier auf die Dimensionen kurz eingehen
  3. When we take security systems, for instance, video surveillance systems, a lot of aspects and notions arise that we need to talk about We came from a more broad approach and started to collect as many criteria related to security products, systems and services as possible; the sources we used were research project‘s observations results, legislation, and existing standards in the context of security
  4. When we take security systems, for instance, video surveillance systems, a lot of aspects and notions arise that we need to talk about We came from a more broad approach and started to collect as many criteria related to security products, systems and services as possible; the sources we used were research project‘s observations results, legislation, and existing standards in the context of security
  5. When we take security systems, for instance, video surveillance systems, a lot of aspects and notions arise that we need to talk about We came from a more broad approach and started to collect as many criteria related to security products, systems and services as possible; the sources we used were research project‘s observations results, legislation, and existing standards in the context of security
  6. When we take security systems, for instance, video surveillance systems, a lot of aspects and notions arise that we need to talk about We came from a more broad approach and started to collect as many criteria related to security products, systems and services as possible; the sources we used were research project‘s observations results, legislation, and existing standards in the context of security
  7. When we take security systems, for instance, video surveillance systems, a lot of aspects and notions arise that we need to talk about We came from a more broad approach and started to collect as many criteria related to security products, systems and services as possible; the sources we used were research project‘s observations results, legislation, and existing standards in the context of security
  8. Specification of the security application area (spatial information, time information, actors involved in operating the system, security function of the system) Detailed technical specifications of the system (system architecture and integration, data processing (if any), human interaction and co-operation) Basic information on at least three application scenarios (risk assessment, space and time needed for operating the system, stakeholders and staff involved, narrative of the system process, indication of best and worst case examples)
  9. Specification of the security application area (spatial information, time information, actors involved in operating the system, security function of the system) Detailed technical specifications of the system (system architecture and integration, data processing (if any), human interaction and co-operation) Basic information on at least three application scenarios (risk assessment, space and time needed for operating the system, stakeholders and staff involved, narrative of the system process, indication of best and worst case examples)
  10. Specification of the security application area (spatial information, time information, actors involved in operating the system, security function of the system) Detailed technical specifications of the system (system architecture and integration, data processing (if any), human interaction and co-operation) Basic information on at least three application scenarios (risk assessment, space and time needed for operating the system, stakeholders and staff involved, narrative of the system process, indication of best and worst case examples)
  11. Specification of the security application area (spatial information, time information, actors involved in operating the system, security function of the system) Detailed technical specifications of the system (system architecture and integration, data processing (if any), human interaction and co-operation) Basic information on at least three application scenarios (risk assessment, space and time needed for operating the system, stakeholders and staff involved, narrative of the system process, indication of best and worst case examples)
  12. Specification of the security application area (spatial information, time information, actors involved in operating the system, security function of the system) Detailed technical specifications of the system (system architecture and integration, data processing (if any), human interaction and co-operation) Basic information on at least three application scenarios (risk assessment, space and time needed for operating the system, stakeholders and staff involved, narrative of the system process, indication of best and worst case examples)
  13. 24
  14. 25
  15. 27
  16. 28