Difference between revisions of "Measure type: Information and Communications Technology (ICT)"

From Securipedia
Jump to navigation Jump to search
m
(Tabel uitleggen/introduceren: elke kolom kort benoemen met de juiste link. Threat type (Terrorism)/Threat phase (Terrorism)/Tech Use (Measure types)/Tech Criteria (PRoTECT evaluation). [products/suppliers weglaten])
Line 1: Line 1:
 
ICT could be used for: communicating, storing, analysing and protecting information.
 
ICT could be used for: communicating, storing, analysing and protecting information.
   
  +
''Tabel uitleggen/introduceren: elke kolom kort benoemen met de juiste link. Threat type (Terrorism)/Threat phase (Terrorism)/Tech Use (Measure types)/Tech Criteria (PRoTECT evaluation). [products/suppliers weglaten]''
''Threat type/threat phase/tech use hier uitleggen of linken naar measures en het op die pagina uitleggen?''
 
 
{| class="wikitable"
 
{| class="wikitable"
 
|'''Tech description'''
 
|'''Tech description'''
Line 8: Line 8:
 
|'''Tech use'''
 
|'''Tech use'''
 
|'''Tech criteria'''
 
|'''Tech criteria'''
|'''Products/suppliers'''
 
 
|-
 
|-
 
|Detection of deviant behaviour online (by combining data science (how to extract and model online behaviour) and social science (which behaviours to address))
 
|Detection of deviant behaviour online (by combining data science (how to extract and model online behaviour) and social science (which behaviours to address))
Line 16: Line 15:
 
|Surveil
 
|Surveil
 
|Performance (detection rate)
 
|Performance (detection rate)
|n/a
 
 
|-
 
|-
 
|Vulnerability assessment of individuals before the fact (for example, Multi-Agency Vulnerability Assessment Support Tool (MAVAST))
 
|Vulnerability assessment of individuals before the fact (for example, Multi-Agency Vulnerability Assessment Support Tool (MAVAST))
Line 23: Line 21:
 
|Surveil
 
|Surveil
 
|Performance (accuracy, at face value as data are largely absent)
 
|Performance (accuracy, at face value as data are largely absent)
|Multi-Agency Vulnerability Assessment Support Tool (MAVAST): supports multi-agency teams (for example, police, justice, municipality, social work) in identifying the level of vulnerability of an individual to radicalise in a violent way (by TNO for H2020 Pericles)
 
 
|-
 
|-
 
|GIS system for geographical information
 
|GIS system for geographical information
Line 30: Line 27:
 
|Surveil / respond / protect / detect / improvise
 
|Surveil / respond / protect / detect / improvise
 
|Performance
 
|Performance
|n/a
 
 
|-
 
|-
 
|Video analytics
 
|Video analytics
Line 37: Line 33:
 
|Surveil / respond / protect / detect
 
|Surveil / respond / protect / detect
 
|Performance
 
|Performance
|n/a
 
 
|}
 
|}
 
Other [[Measures|measure types]] are:
 
Other [[Measures|measure types]] are:

Revision as of 10:15, 21 September 2020

ICT could be used for: communicating, storing, analysing and protecting information.

Tabel uitleggen/introduceren: elke kolom kort benoemen met de juiste link. Threat type (Terrorism)/Threat phase (Terrorism)/Tech Use (Measure types)/Tech Criteria (PRoTECT evaluation). [products/suppliers weglaten]

Tech description Threat type Threat phase Tech use Tech criteria
Detection of deviant behaviour online (by combining data science (how to extract and model online behaviour) and social science (which behaviours to address)) all Initial target identification


Surveil Performance (detection rate)
Vulnerability assessment of individuals before the fact (for example, Multi-Agency Vulnerability Assessment Support Tool (MAVAST)) all Initial target identification Surveil Performance (accuracy, at face value as data are largely absent)
GIS system for geographical information all Execution / post-attack/escape Surveil / respond / protect / detect / improvise Performance
Video analytics all Initial target identification / execution / post-attack/escape Surveil / respond / protect / detect Performance

Other measure types are: