SlideShare a Scribd company logo
1 of 11
Can Trust in Security Technologies be Enhanced through Certification?:
Lessons from the CRISP project.
Thordis Sveinsdottir
Trilateral Research Ltd
7th Biennial Surveillance & Society Conference
Barcelona 20-23 April 2016
Security Certification – European Context
 The EU security market, which is strong and fast growing:
 Includes very different types of products and services
 Is supplied by very varied stakeholder group
 There is also a plethora of assorted standards and certification schemes for
security products, systems and services and there is a distinct lack of
harmonisation and mutual recognition of these schemes across Europe.
 CRISP project objectives are to:
 Aid in the harmonisation of the European security market through pan-
European certification
 Increase citizen trust in security products, systems and services through
integrating social dimensions in the evaluation phase
The CRISP project
 Evaluation and Certification Schemes for Security Products (CRISP)
 36 Month project
 1st April 2014-1st March 2017
 Website: http://crispproject.eu/
 Twitter: @CRISP_Project
RRI approach to security RD&I
 There is a need to align security technologies, especially those
which breech citizens’ fundamental rights and privacy, with societal
needs and values to a greater extent (von Schomberg, 2011)
 RRI focus allows for seeing tensions between security and fundamental
rights:
 as a set of practices and issues that can be addressed with an approach where a
concern for ethical and social consequences of technologies are weaved into the
R&D process
 as a process where users and other stakeholders are engaged with producers
early on, to allow for adjustments to security processes, products and systems.
CRISP evaluation of social dimensions
 CRISP will contribute a holistic evaluation methodology for security
products, systems and services that encompasses :
 A defined use scenario
 Multiple stakeholder perspectives on any one security technology
 At the highest level the four dimensions, Security, Trust, Efficiency and
Freedom Infringement (S-T-E-Fi) are each used for evaluation, and
consideration is also paid to their interrelations and potential conflicts.
 Within each evaluation dimension, a number of evaluation criteria are
defined, which are further narrowed down to specific evaluation
questions for each product
The CRISP Web tool
A project manager sets up a scenario, which serves as basis for
evaluation.
Information providers answer questions for each of the STEFi dimensions
Stakeholder Analysis
 Stakeholders included: Security industry, certification bodies, standardisation
organisations, accreditation bodies, insurers, DPAs, policy makers and end users
 Questions to ascertain the opportunities, needs and challenges of current evaluation
and certification of security systems. Ascertaining the need for a scheme such as
CRISP
 Stakeholder analysis consisted of case study research of three technology areas.
 Video Surveillance
 Alarm Systems
 Remotely Piloted Aircraft Systems (drones).
 The case studies included: Desk research, Interviews with stakeholders, Web
surveys
Stakeholder needs from certification
 It provides clear added value (Security industry, certification
bodies):
 Low administrative burden
 Low cost
 One-stop certification
 Transparency at all levels (e.g., documentation, evaluation,
certification processes)
 A robust scheme (minimum allowance for difference)
 Flexibility of scheme (e.g., to allow for technological innovation)
Possible limitations of the CRISP scheme
 The contextual nature of security
 National security cultures/specificities
 Different users/use contexts
 Different use possibilities of any one product
 The subjectivity of the STEFi dimensions
 Too “soft” to serve as effective evaluation criteria
 Concern over key dimensions and their definitions
Trust through certification?
 Case study findings indicate that certification of a product, system or service
enhances feelings of trust, e.g.:
 The notion of certification as a ‘seal of quality’ or assurance to end users’ ranked as
the most important benefit of certification by 85% of supply-side respondents and
82% of demand-side respondents*.
 Certification was also seen to have the benefit of “improving service and product
standards” and was selected by 42,6% of supply and 57,1% of demand side
stakeholders
 However:
 Certification needs to be a transparent process – currently too opaque and
confusing
 Certification seal needs to be well known to be respected/trusted
Contact
 Full findings can be found in the Work Package Report - Sveinsdottir, T., Finn, R.,
Wadhwa K., Rodrigues, R., van Zetten, J. Wurster, S., Murphy, P., Hirschmann, N.,
Rallo, A., Garcia, R., Pauner, C., Viguri, J., Kalan, E. and Kolar, I. (2015) D3.1
Stakeholder Analysis. Available at: http://crispproject.eu/wp-
content/uploads/2015/03/CRISP-D3.1-Stakeholder-Analysis-FINAL.pdf
 Thordis Sveinsdottir – thordis.sveinsdottir@trilateralresearch.com

More Related Content

What's hot

Digital Health & Wellness Summit @ Mobile World Congress 2016
Digital Health & Wellness Summit @ Mobile World Congress 2016Digital Health & Wellness Summit @ Mobile World Congress 2016
Digital Health & Wellness Summit @ Mobile World Congress 20163GDR
 
A koene un_bias_ieee_ebdvf_nov2017
A koene un_bias_ieee_ebdvf_nov2017A koene un_bias_ieee_ebdvf_nov2017
A koene un_bias_ieee_ebdvf_nov2017Ansgar Koene
 
1st eStandards conference: next steps for standardization in large scale eHea...
1st eStandards conference: next steps for standardization in large scale eHea...1st eStandards conference: next steps for standardization in large scale eHea...
1st eStandards conference: next steps for standardization in large scale eHea...chronaki
 
Ansgar rcep algorithmic_bias_july2018
Ansgar rcep algorithmic_bias_july2018Ansgar rcep algorithmic_bias_july2018
Ansgar rcep algorithmic_bias_july2018Ansgar Koene
 
Security stronghold presentation smart uac
Security stronghold presentation   smart uacSecurity stronghold presentation   smart uac
Security stronghold presentation smart uacw_harker
 
eStandards conference: Next steps for standardization in large scale eHealth ...
eStandards conference: Next steps for standardization in large scale eHealth ...eStandards conference: Next steps for standardization in large scale eHealth ...
eStandards conference: Next steps for standardization in large scale eHealth ...chronaki
 
1st eStandards conference: next steps for standardization in large scale eHea...
1st eStandards conference: next steps for standardization in large scale eHea...1st eStandards conference: next steps for standardization in large scale eHea...
1st eStandards conference: next steps for standardization in large scale eHea...chronaki
 
NISO-STM RA21 Project Update
NISO-STM RA21 Project UpdateNISO-STM RA21 Project Update
NISO-STM RA21 Project UpdateTACNISO
 
Improving Medical Technology Communications Through Consensus Building: IEEE ...
Improving Medical Technology Communications Through Consensus Building: IEEE ...Improving Medical Technology Communications Through Consensus Building: IEEE ...
Improving Medical Technology Communications Through Consensus Building: IEEE ...IEEE Standards Association (IEEE SA)
 
TSSG Security research unit May11_zdooly
TSSG Security research unit May11_zdoolyTSSG Security research unit May11_zdooly
TSSG Security research unit May11_zdoolyzdooly
 
Insights into the Canadian eHealth Landscape - MaRS Future of Medicine
Insights into the Canadian eHealth Landscape - MaRS Future of MedicineInsights into the Canadian eHealth Landscape - MaRS Future of Medicine
Insights into the Canadian eHealth Landscape - MaRS Future of MedicineMaRS Discovery District
 
Diffusion of lead user (Presentation)
Diffusion of lead user (Presentation)Diffusion of lead user (Presentation)
Diffusion of lead user (Presentation)punpun
 
European Commission's Open Science Initiative: co-creating added value with data
European Commission's Open Science Initiative: co-creating added value with dataEuropean Commission's Open Science Initiative: co-creating added value with data
European Commission's Open Science Initiative: co-creating added value with dataEFSA EU
 
2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trends2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trendsDImension Data
 
Key Architectural Challenges In Driving Value From Life Science Collaborations
Key Architectural Challenges In Driving Value From Life Science CollaborationsKey Architectural Challenges In Driving Value From Life Science Collaborations
Key Architectural Challenges In Driving Value From Life Science CollaborationsTim Eyres
 
Dennis Kehoe - ECO 15: Digital connectivity in healthcare
Dennis Kehoe - ECO 15: Digital connectivity in healthcareDennis Kehoe - ECO 15: Digital connectivity in healthcare
Dennis Kehoe - ECO 15: Digital connectivity in healthcareInnovation Agency
 
OpenClinica @ AMIA 2014 Joint Summits
OpenClinica @ AMIA 2014 Joint SummitsOpenClinica @ AMIA 2014 Joint Summits
OpenClinica @ AMIA 2014 Joint SummitsBen Baumann
 
1st eStandards conference: next steps for standardization in large scale eHea...
1st eStandards conference: next steps for standardization in large scale eHea...1st eStandards conference: next steps for standardization in large scale eHea...
1st eStandards conference: next steps for standardization in large scale eHea...chronaki
 

What's hot (19)

Digital Health & Wellness Summit @ Mobile World Congress 2016
Digital Health & Wellness Summit @ Mobile World Congress 2016Digital Health & Wellness Summit @ Mobile World Congress 2016
Digital Health & Wellness Summit @ Mobile World Congress 2016
 
A koene un_bias_ieee_ebdvf_nov2017
A koene un_bias_ieee_ebdvf_nov2017A koene un_bias_ieee_ebdvf_nov2017
A koene un_bias_ieee_ebdvf_nov2017
 
1st eStandards conference: next steps for standardization in large scale eHea...
1st eStandards conference: next steps for standardization in large scale eHea...1st eStandards conference: next steps for standardization in large scale eHea...
1st eStandards conference: next steps for standardization in large scale eHea...
 
Ansgar rcep algorithmic_bias_july2018
Ansgar rcep algorithmic_bias_july2018Ansgar rcep algorithmic_bias_july2018
Ansgar rcep algorithmic_bias_july2018
 
Security stronghold presentation smart uac
Security stronghold presentation   smart uacSecurity stronghold presentation   smart uac
Security stronghold presentation smart uac
 
eStandards conference: Next steps for standardization in large scale eHealth ...
eStandards conference: Next steps for standardization in large scale eHealth ...eStandards conference: Next steps for standardization in large scale eHealth ...
eStandards conference: Next steps for standardization in large scale eHealth ...
 
1st eStandards conference: next steps for standardization in large scale eHea...
1st eStandards conference: next steps for standardization in large scale eHea...1st eStandards conference: next steps for standardization in large scale eHea...
1st eStandards conference: next steps for standardization in large scale eHea...
 
NISO-STM RA21 Project Update
NISO-STM RA21 Project UpdateNISO-STM RA21 Project Update
NISO-STM RA21 Project Update
 
Improving Medical Technology Communications Through Consensus Building: IEEE ...
Improving Medical Technology Communications Through Consensus Building: IEEE ...Improving Medical Technology Communications Through Consensus Building: IEEE ...
Improving Medical Technology Communications Through Consensus Building: IEEE ...
 
TSSG Security research unit May11_zdooly
TSSG Security research unit May11_zdoolyTSSG Security research unit May11_zdooly
TSSG Security research unit May11_zdooly
 
Insights into the Canadian eHealth Landscape - MaRS Future of Medicine
Insights into the Canadian eHealth Landscape - MaRS Future of MedicineInsights into the Canadian eHealth Landscape - MaRS Future of Medicine
Insights into the Canadian eHealth Landscape - MaRS Future of Medicine
 
Diffusion of lead user (Presentation)
Diffusion of lead user (Presentation)Diffusion of lead user (Presentation)
Diffusion of lead user (Presentation)
 
European Commission's Open Science Initiative: co-creating added value with data
European Commission's Open Science Initiative: co-creating added value with dataEuropean Commission's Open Science Initiative: co-creating added value with data
European Commission's Open Science Initiative: co-creating added value with data
 
2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trends2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trends
 
Key Architectural Challenges In Driving Value From Life Science Collaborations
Key Architectural Challenges In Driving Value From Life Science CollaborationsKey Architectural Challenges In Driving Value From Life Science Collaborations
Key Architectural Challenges In Driving Value From Life Science Collaborations
 
Dennis Kehoe - ECO 15: Digital connectivity in healthcare
Dennis Kehoe - ECO 15: Digital connectivity in healthcareDennis Kehoe - ECO 15: Digital connectivity in healthcare
Dennis Kehoe - ECO 15: Digital connectivity in healthcare
 
OpenClinica @ AMIA 2014 Joint Summits
OpenClinica @ AMIA 2014 Joint SummitsOpenClinica @ AMIA 2014 Joint Summits
OpenClinica @ AMIA 2014 Joint Summits
 
Summary of the Workshop: e-tools and their implementation in the field of Occ...
Summary of the Workshop: e-tools and their implementation in the field of Occ...Summary of the Workshop: e-tools and their implementation in the field of Occ...
Summary of the Workshop: e-tools and their implementation in the field of Occ...
 
1st eStandards conference: next steps for standardization in large scale eHea...
1st eStandards conference: next steps for standardization in large scale eHea...1st eStandards conference: next steps for standardization in large scale eHea...
1st eStandards conference: next steps for standardization in large scale eHea...
 

Viewers also liked

1st eStandards conference: next steps for standardization in large scale eHea...
1st eStandards conference: next steps for standardization in large scale eHea...1st eStandards conference: next steps for standardization in large scale eHea...
1st eStandards conference: next steps for standardization in large scale eHea...chronaki
 
Interoperability and Open Standards EC 19 Nov2008
Interoperability and Open Standards EC 19 Nov2008Interoperability and Open Standards EC 19 Nov2008
Interoperability and Open Standards EC 19 Nov2008aclorrain
 
2016 jun16 msp european catalogue
2016 jun16 msp   european catalogue2016 jun16 msp   european catalogue
2016 jun16 msp european catalogueRodolphe Wouters
 
Blind - Standardisation and standards as research and innovation indicators
Blind - Standardisation and standards as research and innovation indicatorsBlind - Standardisation and standards as research and innovation indicators
Blind - Standardisation and standards as research and innovation indicatorsinnovationoecd
 
CRISP Stakeholder Analysis
CRISP Stakeholder AnalysisCRISP Stakeholder Analysis
CRISP Stakeholder AnalysisCRISP Project
 
CRISP Work package 4 Key Outcomes
CRISP Work package 4 Key OutcomesCRISP Work package 4 Key Outcomes
CRISP Work package 4 Key OutcomesCRISP Project
 
Crisp kaleidoscope presentation 13112015
Crisp kaleidoscope presentation 13112015Crisp kaleidoscope presentation 13112015
Crisp kaleidoscope presentation 13112015CRISP Project
 
Estándares en Unión Europea: Marco, Desafíos y Oportunidades - Francisco Garc...
Estándares en Unión Europea: Marco, Desafíos y Oportunidades - Francisco Garc...Estándares en Unión Europea: Marco, Desafíos y Oportunidades - Francisco Garc...
Estándares en Unión Europea: Marco, Desafíos y Oportunidades - Francisco Garc...Asociación XBRL España
 

Viewers also liked (9)

1st eStandards conference: next steps for standardization in large scale eHea...
1st eStandards conference: next steps for standardization in large scale eHea...1st eStandards conference: next steps for standardization in large scale eHea...
1st eStandards conference: next steps for standardization in large scale eHea...
 
Interoperability and Open Standards EC 19 Nov2008
Interoperability and Open Standards EC 19 Nov2008Interoperability and Open Standards EC 19 Nov2008
Interoperability and Open Standards EC 19 Nov2008
 
Promoting (meta)-data standards - The European Commission ISA Programme per...
 Promoting (meta)-data standards- The European Commission ISA Programme per... Promoting (meta)-data standards- The European Commission ISA Programme per...
Promoting (meta)-data standards - The European Commission ISA Programme per...
 
2016 jun16 msp european catalogue
2016 jun16 msp   european catalogue2016 jun16 msp   european catalogue
2016 jun16 msp european catalogue
 
Blind - Standardisation and standards as research and innovation indicators
Blind - Standardisation and standards as research and innovation indicatorsBlind - Standardisation and standards as research and innovation indicators
Blind - Standardisation and standards as research and innovation indicators
 
CRISP Stakeholder Analysis
CRISP Stakeholder AnalysisCRISP Stakeholder Analysis
CRISP Stakeholder Analysis
 
CRISP Work package 4 Key Outcomes
CRISP Work package 4 Key OutcomesCRISP Work package 4 Key Outcomes
CRISP Work package 4 Key Outcomes
 
Crisp kaleidoscope presentation 13112015
Crisp kaleidoscope presentation 13112015Crisp kaleidoscope presentation 13112015
Crisp kaleidoscope presentation 13112015
 
Estándares en Unión Europea: Marco, Desafíos y Oportunidades - Francisco Garc...
Estándares en Unión Europea: Marco, Desafíos y Oportunidades - Francisco Garc...Estándares en Unión Europea: Marco, Desafíos y Oportunidades - Francisco Garc...
Estándares en Unión Europea: Marco, Desafíos y Oportunidades - Francisco Garc...
 

Similar to Trust and security technologies: Lessons from the CRISP project

CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.Trilateral Research
 
A stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilienceA stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilienceTrilateral Research
 
Examining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster ResilienceExamining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster ResilienceTrilateral Research
 
Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...stuimrozsm
 
The Role of National Quality Infrastructure in Promoting Risk-Based Solutions...
The Role of National Quality Infrastructure in Promoting Risk-Based Solutions...The Role of National Quality Infrastructure in Promoting Risk-Based Solutions...
The Role of National Quality Infrastructure in Promoting Risk-Based Solutions...Dr. Monideep Dey
 
Corporate Tekes Safety and Security programme 2013
Corporate Tekes Safety and Security programme 2013Corporate Tekes Safety and Security programme 2013
Corporate Tekes Safety and Security programme 2013Turvallisuus2013
 
EuroPriSe and ISDP 10003 2015
EuroPriSe and ISDP 10003 2015EuroPriSe and ISDP 10003 2015
EuroPriSe and ISDP 10003 2015Marco Moreschini
 
EuroPriSe and ISDP10003 2015 -
EuroPriSe and ISDP10003  2015 - EuroPriSe and ISDP10003  2015 -
EuroPriSe and ISDP10003 2015 - Marco Moreschini
 
Suitability of Agile Methods for Safety-Critical Systems Development: A Surve...
Suitability of Agile Methods for Safety-Critical Systems Development: A Surve...Suitability of Agile Methods for Safety-Critical Systems Development: A Surve...
Suitability of Agile Methods for Safety-Critical Systems Development: A Surve...Editor IJCATR
 
TAICS - Cybersecurity Certification for European Market.pptx
TAICS - Cybersecurity Certification for European Market.pptxTAICS - Cybersecurity Certification for European Market.pptx
TAICS - Cybersecurity Certification for European Market.pptxJavier Tallón
 
CRISP evaluation using the STEFi approach
CRISP evaluation using the STEFi approachCRISP evaluation using the STEFi approach
CRISP evaluation using the STEFi approachCRISP Project
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...abhichowdary16
 
Criterios Minimos de Seguridad CTPAT 2019 conference
Criterios Minimos de Seguridad CTPAT 2019 conferenceCriterios Minimos de Seguridad CTPAT 2019 conference
Criterios Minimos de Seguridad CTPAT 2019 conferenceJoe Garza
 
Model-based security testing
Model-based security testingModel-based security testing
Model-based security testingAxel Rennoch
 
Framework for Improving Critical Infrastructure Cyber.docx
Framework for Improving  Critical Infrastructure Cyber.docxFramework for Improving  Critical Infrastructure Cyber.docx
Framework for Improving Critical Infrastructure Cyber.docxbudbarber38650
 
OEB Cyber Security Framework
OEB Cyber Security FrameworkOEB Cyber Security Framework
OEB Cyber Security FrameworkNorbi Hegedus
 
Img s position-paper_for_h2020
Img s position-paper_for_h2020Img s position-paper_for_h2020
Img s position-paper_for_h2020Marco Manso
 
Introduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls MatrixIntroduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls MatrixJohn Yeoh
 

Similar to Trust and security technologies: Lessons from the CRISP project (20)

CRISP WP3 stakeholder workshop
CRISP WP3 stakeholder workshopCRISP WP3 stakeholder workshop
CRISP WP3 stakeholder workshop
 
CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.
 
A stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilienceA stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilience
 
Examining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster ResilienceExamining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster Resilience
 
Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...
 
The Role of National Quality Infrastructure in Promoting Risk-Based Solutions...
The Role of National Quality Infrastructure in Promoting Risk-Based Solutions...The Role of National Quality Infrastructure in Promoting Risk-Based Solutions...
The Role of National Quality Infrastructure in Promoting Risk-Based Solutions...
 
Corporate Tekes Safety and Security programme 2013
Corporate Tekes Safety and Security programme 2013Corporate Tekes Safety and Security programme 2013
Corporate Tekes Safety and Security programme 2013
 
EuroPriSe and ISDP 10003 2015
EuroPriSe and ISDP 10003 2015EuroPriSe and ISDP 10003 2015
EuroPriSe and ISDP 10003 2015
 
EuroPriSe and ISDP10003 2015 -
EuroPriSe and ISDP10003  2015 - EuroPriSe and ISDP10003  2015 -
EuroPriSe and ISDP10003 2015 -
 
Suitability of Agile Methods for Safety-Critical Systems Development: A Surve...
Suitability of Agile Methods for Safety-Critical Systems Development: A Surve...Suitability of Agile Methods for Safety-Critical Systems Development: A Surve...
Suitability of Agile Methods for Safety-Critical Systems Development: A Surve...
 
Principles and risk assessment of managing distributed ontologies hosted by e...
Principles and risk assessment of managing distributed ontologies hosted by e...Principles and risk assessment of managing distributed ontologies hosted by e...
Principles and risk assessment of managing distributed ontologies hosted by e...
 
TAICS - Cybersecurity Certification for European Market.pptx
TAICS - Cybersecurity Certification for European Market.pptxTAICS - Cybersecurity Certification for European Market.pptx
TAICS - Cybersecurity Certification for European Market.pptx
 
CRISP evaluation using the STEFi approach
CRISP evaluation using the STEFi approachCRISP evaluation using the STEFi approach
CRISP evaluation using the STEFi approach
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
Criterios Minimos de Seguridad CTPAT 2019 conference
Criterios Minimos de Seguridad CTPAT 2019 conferenceCriterios Minimos de Seguridad CTPAT 2019 conference
Criterios Minimos de Seguridad CTPAT 2019 conference
 
Model-based security testing
Model-based security testingModel-based security testing
Model-based security testing
 
Framework for Improving Critical Infrastructure Cyber.docx
Framework for Improving  Critical Infrastructure Cyber.docxFramework for Improving  Critical Infrastructure Cyber.docx
Framework for Improving Critical Infrastructure Cyber.docx
 
OEB Cyber Security Framework
OEB Cyber Security FrameworkOEB Cyber Security Framework
OEB Cyber Security Framework
 
Img s position-paper_for_h2020
Img s position-paper_for_h2020Img s position-paper_for_h2020
Img s position-paper_for_h2020
 
Introduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls MatrixIntroduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls Matrix
 

More from Trilateral Research

Designing Security Across Boundaries: mapping disperse data to collaborative...
Designing Security Across Boundaries:  mapping disperse data to collaborative...Designing Security Across Boundaries:  mapping disperse data to collaborative...
Designing Security Across Boundaries: mapping disperse data to collaborative...Trilateral Research
 
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...Trilateral Research
 
Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...Trilateral Research
 
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...Trilateral Research
 
Ethics and technology in humanitarian setting
Ethics and technology in humanitarian settingEthics and technology in humanitarian setting
Ethics and technology in humanitarian settingTrilateral Research
 
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectPrivacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectTrilateral Research
 
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Trilateral Research
 
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Trilateral Research
 
Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis Trilateral Research
 
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforceEvolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforceTrilateral Research
 
Social Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and ChallangesSocial Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and ChallangesTrilateral Research
 
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction Trilateral Research
 
ENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentationENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentationTrilateral Research
 
Esports in the UK - privacy risks
Esports in the UK - privacy risksEsports in the UK - privacy risks
Esports in the UK - privacy risksTrilateral Research
 
Enhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national levelEnhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national levelTrilateral Research
 
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...Trilateral Research
 
Key Outputs of the E-CRIME project
Key Outputs of the E-CRIME projectKey Outputs of the E-CRIME project
Key Outputs of the E-CRIME projectTrilateral Research
 
Defining vulnerability to understand the obligations of States towards person...
Defining vulnerability to understand the obligations of States towards person...Defining vulnerability to understand the obligations of States towards person...
Defining vulnerability to understand the obligations of States towards person...Trilateral Research
 

More from Trilateral Research (20)

Star II sme hotline 21.01.20
Star II sme hotline 21.01.20Star II sme hotline 21.01.20
Star II sme hotline 21.01.20
 
Designing Security Across Boundaries: mapping disperse data to collaborative...
Designing Security Across Boundaries:  mapping disperse data to collaborative...Designing Security Across Boundaries:  mapping disperse data to collaborative...
Designing Security Across Boundaries: mapping disperse data to collaborative...
 
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
 
Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...
 
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
 
Ethics and technology in humanitarian setting
Ethics and technology in humanitarian settingEthics and technology in humanitarian setting
Ethics and technology in humanitarian setting
 
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectPrivacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
 
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
 
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
 
Overview of CLARITY project
Overview of CLARITY projectOverview of CLARITY project
Overview of CLARITY project
 
Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis
 
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforceEvolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforce
 
Social Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and ChallangesSocial Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and Challanges
 
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
 
ENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentationENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentation
 
Esports in the UK - privacy risks
Esports in the UK - privacy risksEsports in the UK - privacy risks
Esports in the UK - privacy risks
 
Enhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national levelEnhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national level
 
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
 
Key Outputs of the E-CRIME project
Key Outputs of the E-CRIME projectKey Outputs of the E-CRIME project
Key Outputs of the E-CRIME project
 
Defining vulnerability to understand the obligations of States towards person...
Defining vulnerability to understand the obligations of States towards person...Defining vulnerability to understand the obligations of States towards person...
Defining vulnerability to understand the obligations of States towards person...
 

Recently uploaded

Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Hasting Chen
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfhenrik385807
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Krijn Poppe
 
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
LANDMARKS  AND MONUMENTS IN NIGERIA.pptxLANDMARKS  AND MONUMENTS IN NIGERIA.pptx
LANDMARKS AND MONUMENTS IN NIGERIA.pptxBasil Achie
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...NETWAYS
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...NETWAYS
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxFamilyWorshipCenterD
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...NETWAYS
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@vikas rana
 
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrSaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrsaastr
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptssuser319dad
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )Pooja Nehwal
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...henrik385807
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Pooja Nehwal
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...NETWAYS
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Delhi Call girls
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝soniya singh
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Salam Al-Karadaghi
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfhenrik385807
 

Recently uploaded (20)

Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
 
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
LANDMARKS  AND MONUMENTS IN NIGERIA.pptxLANDMARKS  AND MONUMENTS IN NIGERIA.pptx
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@
 
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrSaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.ppt
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
 

Trust and security technologies: Lessons from the CRISP project

  • 1. Can Trust in Security Technologies be Enhanced through Certification?: Lessons from the CRISP project. Thordis Sveinsdottir Trilateral Research Ltd 7th Biennial Surveillance & Society Conference Barcelona 20-23 April 2016
  • 2. Security Certification – European Context  The EU security market, which is strong and fast growing:  Includes very different types of products and services  Is supplied by very varied stakeholder group  There is also a plethora of assorted standards and certification schemes for security products, systems and services and there is a distinct lack of harmonisation and mutual recognition of these schemes across Europe.  CRISP project objectives are to:  Aid in the harmonisation of the European security market through pan- European certification  Increase citizen trust in security products, systems and services through integrating social dimensions in the evaluation phase
  • 3. The CRISP project  Evaluation and Certification Schemes for Security Products (CRISP)  36 Month project  1st April 2014-1st March 2017  Website: http://crispproject.eu/  Twitter: @CRISP_Project
  • 4. RRI approach to security RD&I  There is a need to align security technologies, especially those which breech citizens’ fundamental rights and privacy, with societal needs and values to a greater extent (von Schomberg, 2011)  RRI focus allows for seeing tensions between security and fundamental rights:  as a set of practices and issues that can be addressed with an approach where a concern for ethical and social consequences of technologies are weaved into the R&D process  as a process where users and other stakeholders are engaged with producers early on, to allow for adjustments to security processes, products and systems.
  • 5. CRISP evaluation of social dimensions  CRISP will contribute a holistic evaluation methodology for security products, systems and services that encompasses :  A defined use scenario  Multiple stakeholder perspectives on any one security technology  At the highest level the four dimensions, Security, Trust, Efficiency and Freedom Infringement (S-T-E-Fi) are each used for evaluation, and consideration is also paid to their interrelations and potential conflicts.  Within each evaluation dimension, a number of evaluation criteria are defined, which are further narrowed down to specific evaluation questions for each product
  • 6. The CRISP Web tool A project manager sets up a scenario, which serves as basis for evaluation. Information providers answer questions for each of the STEFi dimensions
  • 7. Stakeholder Analysis  Stakeholders included: Security industry, certification bodies, standardisation organisations, accreditation bodies, insurers, DPAs, policy makers and end users  Questions to ascertain the opportunities, needs and challenges of current evaluation and certification of security systems. Ascertaining the need for a scheme such as CRISP  Stakeholder analysis consisted of case study research of three technology areas.  Video Surveillance  Alarm Systems  Remotely Piloted Aircraft Systems (drones).  The case studies included: Desk research, Interviews with stakeholders, Web surveys
  • 8. Stakeholder needs from certification  It provides clear added value (Security industry, certification bodies):  Low administrative burden  Low cost  One-stop certification  Transparency at all levels (e.g., documentation, evaluation, certification processes)  A robust scheme (minimum allowance for difference)  Flexibility of scheme (e.g., to allow for technological innovation)
  • 9. Possible limitations of the CRISP scheme  The contextual nature of security  National security cultures/specificities  Different users/use contexts  Different use possibilities of any one product  The subjectivity of the STEFi dimensions  Too “soft” to serve as effective evaluation criteria  Concern over key dimensions and their definitions
  • 10. Trust through certification?  Case study findings indicate that certification of a product, system or service enhances feelings of trust, e.g.:  The notion of certification as a ‘seal of quality’ or assurance to end users’ ranked as the most important benefit of certification by 85% of supply-side respondents and 82% of demand-side respondents*.  Certification was also seen to have the benefit of “improving service and product standards” and was selected by 42,6% of supply and 57,1% of demand side stakeholders  However:  Certification needs to be a transparent process – currently too opaque and confusing  Certification seal needs to be well known to be respected/trusted
  • 11. Contact  Full findings can be found in the Work Package Report - Sveinsdottir, T., Finn, R., Wadhwa K., Rodrigues, R., van Zetten, J. Wurster, S., Murphy, P., Hirschmann, N., Rallo, A., Garcia, R., Pauner, C., Viguri, J., Kalan, E. and Kolar, I. (2015) D3.1 Stakeholder Analysis. Available at: http://crispproject.eu/wp- content/uploads/2015/03/CRISP-D3.1-Stakeholder-Analysis-FINAL.pdf  Thordis Sveinsdottir – thordis.sveinsdottir@trilateralresearch.com