You may be trying to access this site from a secured browser on the server. Please enable scripts and reload this page.
Turn on more accessible mode
Turn off more accessible mode
Skip Ribbon Commands
Skip to main content
Turn off Animations
Turn on Animations
SharePoint
Sign In
Use SHIFT+ENTER to open the menu (new window).
Follow
ICES Surveys
Currently selected
Confirmation
2018_Tools_for_EBM
It looks like your browser does not have JavaScript enabled. Please turn on JavaScript and try again.
Recent
ICES Surveys
Currently selected
Confirmation
Site Contents
This survey aims to gather information about specific tools in advance of the AORA EA2OHS workshop on Tools for EBM.
Please enter the case name:
Homesecuritysystems
Contact person (name and email)
Homesecuritysystems
Reference to documentation. Please include references to method descriptions and links to reports of the application in management.
https://www.mysecurityquote.com
Please provide a short description of the case, include a list of aims and the management options explored:
ProtonVPN is an excellent choice for users that are looking for a secure and privacy-focused VPN. It's based in Switzerland, which includes strong data privacy laws. ProtonVPN also offers a variety of security features, including AES-256 encryption, a kill switch, and a no-logs policy. ProtonVPN is an excellent choice for users who need a VPN for general web browsing and streaming. However, its speeds are not as fast as NordVPN or ExpressVPN.
Please indicate the specific geographic location of the case:
Homesecuritysystems
If possible, please indicate the geographic extent of the case (e.g. km2)
Homesecuritysystems
Please indicate the name of the tool(s) used:
Homesecuritysystems
Please choose a category that best describes the tool used in the case:
Risk Analysis
Please describe the data required to use the tool:
Homesecuritysystems
Please shortly describe the strength of the tool(s) used in this case:
Homesecuritysystems
Please shortly describe the limitations of the tool(s) used in this case:
Homesecuritysystems
Please select the best description of how the tool(s) has been applied in management (to date):
In process of adoption
Please choose the type of application that best describes the tool:
(Please choose all that apply)
Tactical
Please shortly describe any visualisations associated with the tool:
(E.g. graphs, infographics, videos)
Homesecuritysystems
Please shortly describe any strengths of the visualisations:
Homesecuritysystems
Please shortly describe any limitations of the use of visualisations in the case:
Homesecuritysystems
Please indicate how much time was spent with managers familiarising them with the tool before they started using it in management:
Homesecuritysystems
Could this tool be adopted for use in other areas? Please indicate how easy/hard this adaptation might be:
Homesecuritysystems
What data would be required to use the tool in a different case/area?
Homesecuritysystems
How much time would be required to adopt the tool for use in a new case?
Homesecuritysystems
Management success: The tool helped to achieve ecosystem targets.
Strongly disagree
Neutral
Strongly agreeh
1
2
3
4
5
N/A
Please indicate if you agree with the statement:
Management success: The tool was accepted by the public.
Strongly disagree
Neutral
Strongly agree
1
2
3
4
5
Please indicate if you agree with the statement:
Management success: The tool was easy to implement.
Strongly disagree
Neutral
Strongly agree
1
2
3
4
5
Please indicate if you agree with the statement:
Created at 11/30/2023 5:28 by
Last modified at 11/30/2023 5:28 by