Washington, DC, United States
Washington, DC, United States
SEARCH FILTERS
Time filter
Source Type

News Article | April 26, 2017
Site: www.techrepublic.com

Ransomware by any definition is a criminal cheap shot, taking advantage of unsuspecting individuals by blocking access to computing systems and/or important files. What's more, users have few proactive defense options that are effective. Thankfully, that is changing with the advent of Data-Protection and Backup (DPB) software platforms. DPB software incorporates ransomware detection and data-protection elements into backup software. The idea is the platform will detect the attack, stop it, and reset the system and affected files. If that is not possible, the system files and data can be restored using the last safe backup version. The theory sounds good; however, because it's relatively new, discerning individuals are going to want proof that DPB software systems do what is advertised. This is where the experts at AV-TEST come in. Seeing a need, AV-TEST engineers developed an evaluation program to put DPB software through its paces. The DPB programs were required to defend "test PCs" running Windows 7 and data stored on the computers against two of the latest versions of crypto-Trojan Cerber, which proliferates via email attachments and infected websites. Tested DPB platforms included Acronis True Image 2017 New Generation Premium, Carbonite Personal PLUS, CrashPlan for Home, and iDrive. In an AV-TEST press release, the authors said, "All the DPB programs tested can handle traditional backup methods, e.g. backup copies in individual files, as well as images of a complete system on storage media such as external hard drives." The results were published in the AV-TEST report Data Protection and Backup Software Test (03 Apr 2017) (PDF). The DPB platforms were evaluated on these criteria: Usability, Performance, Functionality, and Threat Protection. This criterion measures the ease and comfort level when installing and setting up the application. The language used is evaluated to determine if it is appropriate for a variety of users from novice to proficient users. AV-TEST engineers favored the Acronis install, which is straightforward and includes a wizard for creating backup jobs. However, the testers noted that setup preferences are highly subjective. The time required for users to create complete and incremental backups of the entire system and differential data sets, along with the time needed to recover the same data, was measured. A common feature of modern backup systems is the continuous backup of files or designated folders. The speed of data backup, how quickly restoration can occur, and the frequency of backing up data are all critical to successfully foiling ransomware. "Acronis True Image is the clear winner when it comes to performance," the report said. "No other product reaches similar speed when backing up or restoring data for small, large system, or changed files and data stored on HDD or SSD." AV-TEST engineers determined the features considered vital for a data protection application. "We validated the existence of such features in the application and through information provided online by the vendors," the report said. "Acronis shared first place with iDrive, both having 33 out of a possible 39 features required in this category." Threat protection tests determine whether the data on the system can be recovered after an infection. The data-protection suite must be able to keep its recovery capabilities even after an attack has occurred. "Acronis is the only tested DPB offering an active ransomware protection," the AV-TEST report said. "It stopped all five encryptors tested. In only one case, the files could not be recovered by Acronis and the local backup was also affected." Acronis is the only product to satisfy AV-TEST's requirements and obtain the company's Approved Backup & Data Security Software certificate. Acronis's product was first or shared first in all categories. The product received a: The people at AV-TEST feel their testing shows anti-malware ought to include some form of backup software. One more thing to pay attention to when shopping for a DPB package — according to AV-TEST, Acronis True Image 2017 New Generation Premium is currently the only DPB solution capable of stopping ransomware attacks. Have you used any of the products discussed here? Share your recommendations and advice with fellow TechRepublic members.


G2 Crowd, the world’s leading business software review platform, today released the Spring 2017 Professional Service Automation Usability Index report to help businesses quickly identify the most usable professional services automation products. Krow PSA received the highest overall usability score with an 8.91 out of 10. The average score for the 12 products included in the report was a 7.89. A product’s Usability score is calculated by a proprietary algorithm that factors in real-user satisfaction ratings for a number of user-related review questions. Software buyers can compare products in the Professional Service Automation category according to their Usability scores to streamline the buying process and quickly identify the most usable professional service automation products based on the experiences of their peers. For vendors, media, investors, and analysts, the Index provides benchmarks for product comparison and market trend analysis. G2 Crowd, the world’s leading business software review platform, leverages more than 150,000 user reviews to drive better purchasing decisions. Technology buyers, investors, and analysts use the site to compare and select the best software based on peer reviews and synthesized social data. Monthly more than a half-million people visit G2 Crowd’s site. Co-founded by the founder and former executives from SaaS leader BigMachines and backed by roughly $12 million in capital, G2 Crowd aims to bring authenticity and transparency to business technology research. For more information, go to G2Crowd.com


DUBLIN--(BUSINESS WIRE)--Research and Markets has announced the addition of the "An Introduction to Medical Device Software: Regulations and Requirements" conference to their offering. This course will provide a comprehensive introduction to the regulations and requirements that apply to Medical Device Software. The seminar will be highly interactive, using real life examples and state-of- the-art practices identified from Notified Bodies in Europe. How to prepare compliant MDD Technical File documentation will be explained for Medical Device Software products. Software specification, risk management, architectures, usability and resulting design documentation will be discussed. In addition, practical tips on how to streamline the development process, understand the regulatory requirements and how Notified Bodies review Technical Files will be covered. Day two of the course will go into more depth and will focus on practical implication of Risk Management and usability, and will look in detail at the FDA guidance on Medical Device Software compared with the MDD guidance. Software recalls will be discussed, the use of apps in medical devices as well as the implications of the new draft Usability Standard. Practical advice on how to validate your system design will also be addressed. - Comply with the MEDDEV on Stand Alone Software - Know the Principles to Bring a Medical Device Software Product to the Market - Be Aware of the US Code of Federal Regulations and its Implications for Software - Review the IEC and EN ISO Standards and their Applicability; including Risk Management and Usability For more information about this conference visit http://www.researchandmarkets.com/research/c4p5br/an_introduction


News Article | April 17, 2017
Site: www.techrepublic.com

Usability, ease of navigation and the overall user experience are all very important in analytics dashboard design—but equally important is understanding what the end user's objectives are when he or she uses an analytics dashboard or a user interface—because if you don't know what they want to get out of the analytics, you risk losing the user. Missing a target on an analytics interface can have serious repercussions. Entire analytics projects have been shelved—not because of the business value of what an app can do—but because of a poorly designed user interface or dashboard that was impossible to understand or to navigate to results. How do you avoid this pitfall? Sit down with your target user to determine exactly what types of answers from data they expect to get. There is a business process behind how the user cuts into analytics results just as there is a process on the analytics side to extract meaning out of raw data. To get to answers, the user needs instrumentation on their dashboard that enables rapid time to results. They might want to know in an eye shot how much sales are ahead of or behind target at this time of the month, or if there are any slowdowns in a city subway system. If there is problem with sales or the subway system, the dashboard or interface into the application must rapidly direct them to an actionable answer. This sounds simple, but it isn't. All too often, user interface and dashboard designers start the process by imagining how they would want to see data. They might not even be familiar with the thought or business processes that their end user uses. SEE: Salesforce bolsters Sales Cloud with more Einstein AI (ZDNet) If you're new to interface and dashboard designs for analytics, start with the basics and use best practices. A good entry point for beginners is to use tools like Google Analytics Help which illustrates and explains the practices and the steps for designing analytics dashboards with widgets, charts, geographical shapes and data. These best practices illustrate how to construct a dashboard or a user interface that is static and not interactive, but they give a good foundation. Common best practices include not putting too much data on dashboards so as to overwhelm the user, and selecting meaningful pictorial objects that can "tell a story" to a user in an eyeshot. Once you understand the business process you're supporting, move to more interactive analytics dashboards. The big trend in analytics dashboard design in 2017 is to make them much more interactive with their users, so that users can readily drill down to get at more detailed information when they need it. Here are some showcase examples: Nevertheless, the caveat remains that you should first understand your users' thought and business flows. Your goal is to create an interactive dashboard that can get the user to results with minimum effort. To illustrate, if a farmer wants to know which areas of his field are producing crops at lower yields, he wants to be able to drill down to check the soil content of lower yield areas so he can determine if a different fertilizer mix is needed. He doesn't necessarily need to know every characteristic of his field—unless he asks for it. SEE: DataGravity for Virtualization: Discover, analyse, protect and recover sensitive data (Tech Pro Research) One key to designing dashboards is keeping them simple and even unobtrusive. Simplicity of design is often captured by displaying only the top-level information that the user wants to know, and then giving them navigational tools that enable deeper probes if they want them. There are even cases where users don't even want to hear from their analytics, unless there is an alert situation that triggers a dashboard. This idea was summed up in a publication by a team of researchers who designed a dashboard for Zambian health workers to report and track incidences of malaria: "Choosing nimble tools that allow users to create and manipulate dashboards in an iterative fashion is optimal. When users have more control of the data, can experiment with the tools, and can guide development, they not only develop better products, they simultaneously build their own competency and insight." Also see: Special report: How to automate the enterprise (free ebook) 5 steps to turn your company's data into profit Amazon Alexa developers get new metrics to track skill usage and an API for location data How to build a data-driven organization that outpaces competitors Devs are from Mars, Ops are from Venus: Can analytics bridge the gap? (ZDNet)


News Article | May 2, 2017
Site: www.businesswire.com

BOSTON--(BUSINESS WIRE)--Anaqua, Inc., a leading provider of intellectual property (IP) management and analytics software and services, has been recognized in the newly published Hyperion MarketView™ Report for Law Firms as a “Market Leader” and “Highly Innovative.” In the report, titled, Intellectual Property Management Systems for Law Firms, Anaqua also received the highest ratings amongst its competitors when it came to Product Features, Technology and Market Vision. It tied for first amongst its competitors in Product Usability, Maintenance and Support and Company Viability. Anaqua’s latest recognition comes just months after it was named as a Market Leader in Hyperion’s 2016 MarketView™ report on IP management systems for corporations. “Anaqua has invested a tremendous amount of time and research into perfecting our product strategy for law firms and it comes as no surprise that we were rated best amongst our competitors,” said Bob Romeo, CEO of Anaqua. “As we continue our significant global growth, we take pride in offering the best IP management solutions for both corporations and law firms worldwide.” Hyperion Research’s “Market Leader” recognition is presented to software solution providers that are particularly differentiated in the market and have features that are considered truly superior, well established and proven. Anaqua was named a “Market Leader” for: Hyperion’s “Highly Innovative” designation is awarded to software solutions that are significantly novel in the market and have features that are unique in their design, approach and utility. Anaqua received this honor for: “Anaqua has established a deliberate and aggressive push to bring their class-leading innovations in usability, access and operational support to law firms,” said Eyal Iffergan, President of Hyperion Global Partners. “Anaqua’s broad set of tools and persona-based workspaces are curated to support effective IP management as much as efficient IP prosecution. Law firm IP practices have long craved for breakthrough innovation in IP management, and Anaqua delivers earnestly with truly differentiating value that many firms credit for helping them leap to the front of the IP management pack.” The Hyperion report is available immediately to all Hyperion Research Membership clients, or for purchase online with immediate download at www.hgpresearch.com. Purchase of the report includes a 60-minute briefing session with a Senior Analyst to discuss and answer questions about the market and solution providers. ABOUT ANAQUA Anaqua helps corporations and law firms turn intellectual property into competitive advantage. Its software platform combines insight from big data analytics with critical tools, best practice workflows and services into one efficient, intelligent environment that helps IP practices work more efficiently and make better decisions faster. Many of the best-known brands and most innovative products were conceptualized, evaluated, protected and monetized through the ANAQUA platform. Founded in 2004 by IP leaders from The Coca-Cola Company, Ford Motor Company, Kimberly-Clark and British American Tobacco, Anaqua is a privately held company headquartered in Boston (U.S.) and has locations across Europe and Asia. For additional information, please visit www.anaqua.com. ABOUT HYPERION RESEARCH Hyperion Research is the industry's leading source for Legal Solutions Market Intelligence. It works with law firms, law departments and other legal service organizations to make intelligent, fact-based decisions about how to improve their operational performance. The profession's leaders, innovators and trend-makers have come to rely on Hyperion Research as the premier provider of independent market research, analysis and advisory services. Hyperion Research provides unparalleled insight to the leading trends in legal strategy, operations, and technology. Hyperion's analyst-based research and benchmarking informs 8 out of every 10 practice management system selections each year. For more information, visit www.hgpresearch.com.


Wiseguyreports.Com Adds “Software Testing Services -Market Demand, Growth, Opportunities and Analysis of Top Key Player Forecast To 2022” To Its Research Database This report studies the Software Testing Services market status and outlook of global and major regions, from angles of players, regions, product and end Application/industries; this report analyzes the top players in global and major regions, and splits the Software Testing Services market by product and Application/end industries. The global Software Testing Services market is valued at XX million USD in 2016 and is expected to reach XX million USD by the end of 2022, growing at a CAGR of XX% between 2016 and 2022. The Asia-Pacific will occupy for more market share in following years, especially in China, also fast growing India and Southeast Asia regions. United States will still play an important role which cannot be ignored. Any changes from United States might affect the development trend of Software Testing Services. EU also play important roles in global market, with market size of xx million USD in 2016 and will be xx million USD in 2022, with a CAGR of XX. Geographically, this report split global into several key Regions, with, revenue (million USD), market share and growth rate of Software Testing Services for these regions, from 2012 to 2022 (forecast) United States EU Japan China India Southeast Asia On the basis of product, the Software Testing Services market is primarily split into Functional Testing Performance Testing Security Testing Usability Testing Compatibility Testing Others Testing Table Global Software Testing Services Market Size (Million USD) Split by Product Market Segment by Type 2016 2017 2018 2019 2020 2021 2022 Functional Testing xx xx xx xx xx xx xx -Change (%) xx% xx% xx% xx% xx% xx% xx% Performance Testing xx xx xx xx xx xx xx -Change (%) xx% xx% xx% xx% xx% xx% xx% Security Testing xx xx xx xx xx xx xx -Change (%) xx% xx% xx% xx% xx% xx% xx% Usability Testing xx xx xx xx xx xx xx -Change (%) xx% xx% xx% xx% xx% xx% xx% Compatibility Testing xx xx xx xx xx xx xx -Change (%) xx% xx% xx% xx% xx% xx% xx% Others Testing xx xx xx xx xx xx xx -Change (%) xx% xx% xx% xx% xx% xx% xx% Total xx xx xx xx xx xx xx -Change (%) xx% xx% xx% xx% xx% xx% xx% Source: Secondary Literature, Press Releases, Expert Interviews and QYResearch, Mar. 2017 On the basis on the end users/Application, this report covers Mobile Testing Services Website Testing Telecom Testing Healthcare IT Testing Automation Global Software Testing Services Market Size, Status and Forecast 2022 1 Industry Overview 1.1 Software Testing Services Market Overview 1.1.1 Software Testing Services Product Scope 1.1.2 Market Status and Outlook 1.2 Global Software Testing Services Market Size and Analysis by Regions (2012-2017) 1.2.1 United States Software Testing Services Market Status and Outlook 1.2.2 EU Software Testing Services Market Status and Outlook 1.2.3 Japan Software Testing Services Market Status and Outlook 1.2.4 China Software Testing Services Market Status and Outlook 1.2.5 India Software Testing Services Market Status and Outlook 1.2.6 Southeast Asia Software Testing Services Market Status and Outlook 1.3 Classification of Software Testing Services by Product 1.3.1 Global Software Testing Services Revenue (Million USD) and Growth (%) Comparison by Product (2012-2022) 1.3.2 Global Software Testing Services Revenue (Million USD) Market Share (%) by Product in 2016 1.3.3 Functional Testing 1.3.4 Performance Testing 1.3.5 Security Testing 1.3.6 Usability Testing 1.3.7 Compatibility Testing 1.3.8 Others Testing 1.4 Software Testing Services Market by End Users/Application 1.4.1 Mobile Testing Services 1.4.2 Website Testing 1.4.3 Telecom Testing 1.4.4 Healthcare IT Testing 1.4.5 Automation 3 Company (Top Players) Profiles and Key Data 3.1 QASource 3.1.1 Company Profile 3.1.2 Main Business/Business Overview 3.1.3 Products, Services and Solutions 3.1.4 QASource Software Testing Services Revenue (Million USD) (2012-2017) 3.1.5 Recent Developments 3.2 Performance Lab 3.2.1 Company Profile 3.2.2 Main Business/Business Overview 3.2.3 Products, Services and Solutions 3.2.4 Performance Lab Software Testing Services Revenue (Million USD) (2012-2017) 3.2.5 Recent Developments 3.3 Cigniti Technologies 3.3.1 Company Profile 3.3.2 Main Business/Business Overview 3.3.3 Products, Services and Solutions 3.3.4 Cigniti Technologies Software Testing Services Revenue (Million USD) (2012-2017) 3.3.5 Recent Developments 3.4 A1QA 3.4.1 Company Profile 3.4.2 Main Business/Business Overview 3.4.3 Products, Services and Solutions 3.4.4 A1QA Software Testing Services Revenue (Million USD) (2012-2017) 3.4.5 Recent Developments 3.5 QualiTest Group 3.5.1 Company Profile 3.5.2 Main Business/Business Overview 3.5.3 Products, Services and Solutions 3.5.4 QualiTest Group Software Testing Services Revenue (Million USD) (2012-2017) 3.5.5 Recent Developments 3.6 BTC Technologies LLC. 3.6.1 Company Profile 3.6.2 Main Business/Business Overview 3.6.3 Products, Services and Solutions 3.6.4 BTC Technologies LLC. Software Testing Services Revenue (Million USD) (2012-2017) 3.6.5 Recent Developments 3.7 Performance Lab 3.7.1 Company Profile 3.7.2 Main Business/Business Overview 3.7.3 Products, Services and Solutions 3.7.4 Performance Lab Software Testing Services Revenue (Million USD) (2012-2017) 3.7.5 Recent Developments 3.8 Kualitatem 3.8.1 Company Profile 3.8.2 Main Business/Business Overview 3.8.3 Products, Services and Solutions 3.8.4 Kualitatem Software Testing Services Revenue (Million USD) (2012-2017) 3.8.5 Recent Developments 3.9 QualiTest 3.9.1 Company Profile 3.9.2 Main Business/Business Overview 3.9.3 Products, Services and Solutions 3.9.4 QualiTest Software Testing Services Revenue (Million USD) (2012-2017) 3.9.5 Recent Developments 3.10 TestMatick 3.10.1 Company Profile 3.10.2 Main Business/Business Overview 3.10.3 Products, Services and Solutions 3.10.4 TestMatick Software Testing Services Revenue (Million USD) (2012-2017) 3.10.5 Recent Developments 3.11 Oxagile 3.12 ScienceSoft For more information, please visit https://www.wiseguyreports.com/sample-request/1203911-global-software-testing-services-market-size-status-and-forecast-2022


News Article | May 12, 2017
Site: www.prweb.com

G2 Crowd, leading business software review platform, rates APS as Best Meets Requirements and Easiest to Use in their updated Core HR Usability Index for Spring 2017. APS was also recognized by G2 Crowd as the 2017 Best Software for HR Teams and Administrative Teams. In the G2 Crowd Usability Index for Core HR, the APS Core HR solution received the highest ratings for Best Meets Requirements and Easiest to Use among a group of 21 other core HR software solutions. The satisfaction rankings are generated by reviews from actual users of the software. The G2 Usability Index for Core HR scoring is based on the following methodology: Based on the reviews provided, users like the APS's ease of use, ease of admin, and feel that the APS system meets their requirements at a 96% overall satisfaction rate. "APS Core HR Solution has been recognized as 'easiest to use' and 'best meets requirements' in the Spring 2017 Usability Index for Core HR," said Mitch Lieberman, director of research, G2 Crowd. "APS Core HR Solution's satisfaction ratings were highlighted by 'ease of use', 'meets requirements' and 'ease of admin' with each scoring higher than the category average. Additionally, their overall Usability Score was an 8.6, with the industry average at a 7.7." About APS Headquartered in Shreveport, Louisiana,APS is a national cloud-based HR solution provider and online payroll company committed to delivering value through flexible cloud technology and individualized support. Our cloud-based HR solution provides online payroll services, core HR, attendance, self service, ACA compliance tools, and mobile in a single platform which can adapt to meet changing needs of companies in a wide range of industries; we have also been ranked as the 2017 Best Software by G2 Crowd. For more information, please visit http://www.apspayroll.com or call 855-945-7921. G2 Crowd scores products and vendors based on ratings and reviews gathered from their user community, as well as data aggregated from online sources and social networks. G2 Crowd applies a unique, patent-pending algorithm to this data to calculate the customer satisfaction and market presence scores in real time. The intellectual property contained in our sites is protected under federal copyright law. APS trademarks may only be used publicly with permission from APS.


According to Ponemon Institute, in 2016, a single stolen record cost companies $158. Data breaches overall, however, set companies back approximately $4 million, on average. Black hat hackers don't care if they hurt your organization, as your stolen data becomes their revenue source on the Dark Web—but you should. Comodo's personalized reports identify if an enterprise's information has been stolen and dive into how this data became available to cybercriminals in the first place—for example, via credentials stolen from direct network access or data breaches from third-party applications. For each instance, the affected company gets the chance to review a sample of the leaked credential records and details on the attack processes, to help them understand what went wrong. Jerald Nine, director of threat intelligence for Comodo, explained what incriminating mistake he sees most frequently, "Most company employees use the same password for multiple sites and accounts. If their networks are infiltrated by hackers, it becomes extremely easy to gather legitimate credentials that can get cybercriminals into high-value accounts. Pony malware, for example, which we recently discovered during one of these analyses, can affect insurance and benefit, payroll and social media sites—all of which house appealing credentials for buyers on the Dark Web." Large companies are typically more vulnerable to these zero-day "Pony" malware attacks, because they have more employees and may be specifically targeted by attackers. Hackers may believe that they have more to gain targeting larger organizations. In addition to the actual attack vector, the threat analysis assesses business risk specific to the company, such as internal data loss and customer impersonation login risks. This leads to an overview of the current cyber risk state of the company, including potential legal impacts. Most importantly, the report concludes with actionable advice—technological recommendations on how to fill the security gaps discovered. "It is clear that the traditional anti-virus industry has not been able to identify malware and create signatures fast enough to keep up," said Nine. "Traditional attempts to isolate malware at the endpoint use a default-allow approach and resource-intensive virtualization or sandboxing technologies that reduce endpoint performance. These have proven unworkable in most deployments." Comodo's free 'Company Threat Analysis' not only offers interested parties the opportunity to discover vulnerabilities in their personal or company systems, it can educate them on how Comodo's solutions can solve the problems of endpoint solutions past. Comodo Advanced Endpoint Protection, based on the firm's unique, true default-deny platform, allows the known good files, blocks the known bad files, and then isolates the unknown files in automatic containment in a virtual environment on the endpoint. Usability is never impacted, and the endpoint and network are always protected and secure—keeping sensitive data out of hackers' hands and off the Dark Web. More information is available online at https://enterprise.comodo.com/advanced-endpoint-protection. Curious about your company's standing? If your organization has 1,000+ employees, sign up for a personalized, Comodo 'Company Threat Analysis,' at https://threatanalysis.comodo.com/. About Comodo  The Comodo organization is a global innovator of cybersecurity solutions, protecting critical information across the digital landscape. Building on its unique position as the world's largest certificate authority, Comodo authenticates, validates and secures networks and infrastructures from individuals to mid-sized companies to the world's largest enterprises. Comodo provides complete end-to-end security solutions across the boundary, internal network and endpoint with innovative technologies solving the most advanced malware threats, both known and unknown. With global headquarters in Clifton, New Jersey, and branch offices in Silicon Valley, Comodo has international offices in China, India, the Philippines, Romania, Turkey, Ukraine and the United Kingdom. For more information, visit comodo.com. Comodo and the Comodo brand are trademarks of the Comodo Group Inc. or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The current list of Comodo trademarks and patents is available at comodo.com/repository. Keep up to date with the latest Comodo News from the Comodo blog at https://blog.comodo.com/ and on Twitter @ComodoNews. For more information, media and analysts may contact:  Deb Montner Montner Tech PR dmontner@montner.com  203-226-9290 To view the original version on PR Newswire, visit:http://www.prnewswire.com/news-releases/are-hackers-profiting-from-your-corporate-data-on-the-dark-web-comodo-offers-free-company-threat-analysis-to-help-enterprises-find-out-300452504.html


Grant
Agency: European Commission | Branch: H2020 | Program: RIA | Phase: FCT-07-2014 | Award Amount: 5.10M | Year: 2015

Interrogations of suspects in international crime are very difficult and require sophisticated skills, familiarity with different -cultures, laws and methods, and cross-border teamwork. Training law enforcement agents on how to conduct such interrogations is the key to fighting these crimes. LAW-TRAIN applies an interdisciplinary approach for international criminal interrogations. It will unify the methodology for such interrogations and will develop a distributed mixed-reality gaming platform that will provide training opportunities to teams of international interrogators anytime and anywhere. The platform will include a virtual human suspect that will be interrogated and generate dynamic verbal and body responses. The system will provide tools to generate new characters and new scenarios easily. An intervention agent will follow the training and comment online on the team members performance. LAW-TRAIN builds on advanced technologies of virtual and augmented reality to allow law enforcement personnel (and translators, lawyers and judges) from different countries located in different sites to conduct a collaborative investigative interrogation of one or more suspects. All the investigators will see each other and work as a team. Each of the trainees will have access to his/her countrys the information system and will be able to share this information with the other trainees as required in real criminal investigations. The investigational database will be directed at international organized crime focusing on international drug trafficking. However, the LAW-TRAIN engine is designed as a generic engine that will enable development of scenarios for other types of illegal activities as well as other cross-border teamwork training. LAW-TRAIN will be evaluated in an extensive field study with law-enforcement agents from four countries. This will be the first step in the deployment of LAW-TRAIN to fight international organized crime.


Grant
Agency: European Commission | Branch: H2020 | Program: MSCA-ITN-ETN | Phase: MSCA-ITN-2015-ETN | Award Amount: 3.38M | Year: 2015

With the rapid accumulation and processing of personal data by numerous organizations, it is of paramount importance to protect people from adverse uses of their data, while allowing them to enjoy the benefits the use of these data can possibly provide. This is the question of protecting citizens privacy, while enabling them to make informed decisions regarding their actions with privacy implications. The PRIVACY.US innovative training network will train thirteen creative, entrepreneurial and innovative early stage researchers (ESRs) to be able to reason, design and develop innovative solutions to questions related to the protection of citizens privacy, considering the multidisciplinary and intersectoral aspects of the issue. ESRs will be trained to face both current and future challenges in the area of privacy and usability. PRIVACY.US offers a combination of research-related and transferable competence skills that will enhance the career perspectives of the ESRs in both the academic and non-academic sectors. The consortium consists of five universities and five non-academic organizations. This deliberate and balanced construction will ensure that the project outcomes and impacts are maximal with respect to the call criteria and the EU policy areas regarding data security and privacy. The market potential for the generated knowledge is also a key element of this proposal. The consortium industrial partners are three SMEs, one large enterprise, and a data-protection authority. The ESRs will receive comprehensive training and engage in intersectoral collaboration. Through this collaborative effort, the project will make a significant contribution and impact to the ESRs future careers. It will also contribute to shaping future privacy policies and practices in Europe and will significantly advance the state of the art in privacy and usability research.

Loading Usability collaborators
Loading Usability collaborators