{"id":4886,"date":"2015-11-11T16:41:10","date_gmt":"2015-11-11T15:41:10","guid":{"rendered":"http:\/\/dev-leitat-projects-blog.pantheonsite.io\/?p=4886"},"modified":"2025-02-24T21:56:20","modified_gmt":"2025-02-24T21:56:20","slug":"best-practice-for-including-public-end-users-into-security-research-projects","status":"publish","type":"post","link":"https:\/\/leitat.org\/es\/blog\/best-practice-for-including-public-end-users-into-security-research-projects\/","title":{"rendered":"Best practice for including public end users into Security Research Projects"},"content":{"rendered":"<p style=\"text-align: justify;\">During the <a href=\"\/news\/leitat-present-at-connect-eu-day-in-barcelona\/\">Connect-EU Day<\/a>, which took place in Barcelona on 27\/10\/2015, the Chief Superintendent Al\u00edcia Moriana of the Senior Office for Central Coordination \u2013 Mossos d\u2019Esquadra (Catalonia police force) presented the importance of having final end-users from public entities, such as law enforcement organizations, in security projects. She used the SMARTPRO project as an excellent example, as the police force is directly involved in the project consortium and product development. SMARTPRO can thus be seen as a best practice for including public end-users into security research projects. Al\u00edcia highlighted this during her speech at the major brokerage event on Horizon 2020 in Catalonia.<\/p>\n<p style=\"text-align: justify;\"><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-4887 aligncenter\" src=\"https:\/\/leitat.org\/wp-content\/uploads\/2015\/11\/image1-scaled.jpg\" alt=\"Connect EU 1\" width=\"646\" height=\"483\" data-id=\"4887\" srcset=\"https:\/\/leitat.org\/wp-content\/uploads\/2015\/11\/image1-scaled.jpg 2560w, https:\/\/leitat.org\/wp-content\/uploads\/2015\/11\/image1-300x224.jpg 300w, https:\/\/leitat.org\/wp-content\/uploads\/2015\/11\/image1-768x574.jpg 768w, https:\/\/leitat.org\/wp-content\/uploads\/2015\/11\/image1-1024x765.jpg 1024w, https:\/\/leitat.org\/wp-content\/uploads\/2015\/11\/image1-1536x1147.jpg 1536w, https:\/\/leitat.org\/wp-content\/uploads\/2015\/11\/image1-2048x1530.jpg 2048w\" sizes=\"(max-width: 646px) 100vw, 646px\" \/><\/p>\n<p style=\"text-align: justify;\"><img decoding=\"async\" class=\"wp-image-4888 aligncenter\" src=\"https:\/\/leitat.org\/wp-content\/uploads\/2015\/11\/image2-scaled.jpg\" alt=\"Connect EU 2\" width=\"644\" height=\"481\" data-id=\"4888\" srcset=\"https:\/\/leitat.org\/wp-content\/uploads\/2015\/11\/image2-scaled.jpg 2560w, https:\/\/leitat.org\/wp-content\/uploads\/2015\/11\/image2-300x224.jpg 300w, https:\/\/leitat.org\/wp-content\/uploads\/2015\/11\/image2-768x574.jpg 768w, https:\/\/leitat.org\/wp-content\/uploads\/2015\/11\/image2-1024x765.jpg 1024w, https:\/\/leitat.org\/wp-content\/uploads\/2015\/11\/image2-1536x1147.jpg 1536w, https:\/\/leitat.org\/wp-content\/uploads\/2015\/11\/image2-2048x1530.jpg 2048w\" sizes=\"(max-width: 644px) 100vw, 644px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>During the Connect-EU Day, which took place in Barcelona on 27\/10\/2015, the Chief Superintendent Al\u00edcia Moriana of the Senior Office for Central Coordination \u2013 Mossos d\u2019Esquadra (Catalonia police force) presented the importance of having final end-users from public entities, such as law enforcement organizations, in security projects. She used the SMARTPRO project as an excellent [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":4888,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[17],"tags":[206],"class_list":["post-4886","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-energy-transition-and-decarbonization","tag-noticias-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security Research Project<\/title>\n<meta name=\"description\" content=\"Best practice for including public end users into security research projects\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Research Project\" \/>\n<meta property=\"og:description\" content=\"Best practice for including public end users into security research projects\" \/>\n<meta property=\"og:url\" content=\"https:\/\/leitat.org\/es\/blog\/best-practice-for-including-public-end-users-into-security-research-projects\/\" \/>\n<meta property=\"og:site_name\" content=\"Leitat Technological Center\" \/>\n<meta property=\"article:published_time\" content=\"2015-11-11T15:41:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-24T21:56:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/leitat.org\/wp-content\/uploads\/2015\/11\/image2-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1912\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Comunicaci\u00f3n Leitat\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Comunicaci\u00f3n Leitat\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/leitat.org\/es\/blog\/best-practice-for-including-public-end-users-into-security-research-projects\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/leitat.org\/es\/blog\/best-practice-for-including-public-end-users-into-security-research-projects\/\"},\"author\":{\"name\":\"Comunicaci\u00f3n Leitat\",\"@id\":\"https:\/\/leitat.org\/es\/#\/schema\/person\/ca8dc97489cd821df9e0c42930e89131\"},\"headline\":\"Best practice for including public end users into Security Research Projects\",\"datePublished\":\"2015-11-11T15:41:10+00:00\",\"dateModified\":\"2025-02-24T21:56:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/leitat.org\/es\/blog\/best-practice-for-including-public-end-users-into-security-research-projects\/\"},\"wordCount\":114,\"publisher\":{\"@id\":\"https:\/\/leitat.org\/es\/#organization\"},\"image\":{\"@id\":\"https:\/\/leitat.org\/es\/blog\/best-practice-for-including-public-end-users-into-security-research-projects\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/leitat.org\/wp-content\/uploads\/2015\/11\/image2-scaled.jpg\",\"keywords\":[\"Noticias Blog\"],\"articleSection\":[\"Energy transition and decarbonization\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/leitat.org\/es\/blog\/best-practice-for-including-public-end-users-into-security-research-projects\/\",\"url\":\"https:\/\/leitat.org\/es\/blog\/best-practice-for-including-public-end-users-into-security-research-projects\/\",\"name\":\"Security Research Project\",\"isPartOf\":{\"@id\":\"https:\/\/leitat.org\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/leitat.org\/es\/blog\/best-practice-for-including-public-end-users-into-security-research-projects\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/leitat.org\/es\/blog\/best-practice-for-including-public-end-users-into-security-research-projects\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/leitat.org\/wp-content\/uploads\/2015\/11\/image2-scaled.jpg\",\"datePublished\":\"2015-11-11T15:41:10+00:00\",\"dateModified\":\"2025-02-24T21:56:20+00:00\",\"description\":\"Best practice for including public end users into security research projects\",\"breadcrumb\":{\"@id\":\"https:\/\/leitat.org\/es\/blog\/best-practice-for-including-public-end-users-into-security-research-projects\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/leitat.org\/es\/blog\/best-practice-for-including-public-end-users-into-security-research-projects\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/leitat.org\/es\/blog\/best-practice-for-including-public-end-users-into-security-research-projects\/#primaryimage\",\"url\":\"https:\/\/leitat.org\/wp-content\/uploads\/2015\/11\/image2-scaled.jpg\",\"contentUrl\":\"https:\/\/leitat.org\/wp-content\/uploads\/2015\/11\/image2-scaled.jpg\",\"width\":2560,\"height\":1912,\"caption\":\"Connect EU 2\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/leitat.org\/es\/blog\/best-practice-for-including-public-end-users-into-security-research-projects\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"HOME\",\"item\":\"https:\/\/leitat.org\/es\/home\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Energy transition and decarbonization\",\"item\":\"https:\/\/leitat.org\/es\/blog\/category\/energy-transition-and-decarbonization\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Best practice for including public end users into Security Research Projects\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/leitat.org\/es\/#website\",\"url\":\"https:\/\/leitat.org\/es\/\",\"name\":\"Leitat Technological Center\",\"description\":\"Managing Technologies\",\"publisher\":{\"@id\":\"https:\/\/leitat.org\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/leitat.org\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/leitat.org\/es\/#organization\",\"name\":\"Leitat Technological Center\",\"url\":\"https:\/\/leitat.org\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/leitat.org\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/leitat.org\/wp-content\/uploads\/2024\/10\/logo-leitat.svg\",\"contentUrl\":\"https:\/\/leitat.org\/wp-content\/uploads\/2024\/10\/logo-leitat.svg\",\"width\":226,\"height\":78,\"caption\":\"Leitat Technological Center\"},\"image\":{\"@id\":\"https:\/\/leitat.org\/es\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/leitat.org\/es\/#\/schema\/person\/ca8dc97489cd821df9e0c42930e89131\",\"name\":\"Comunicaci\u00f3n Leitat\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/ce5e10560c8753dc6a31f108c84f08103b3e4bb78f97dde95a1445d45abbb09a?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ce5e10560c8753dc6a31f108c84f08103b3e4bb78f97dde95a1445d45abbb09a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ce5e10560c8753dc6a31f108c84f08103b3e4bb78f97dde95a1445d45abbb09a?s=96&d=mm&r=g\",\"caption\":\"Comunicaci\u00f3n Leitat\"},\"sameAs\":[\"https:\/\/leitat.org\"],\"url\":\"https:\/\/leitat.org\/es\/blog\/author\/comunica-wp\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Research Project","description":"Best practice for including public end users into security research projects","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"es_ES","og_type":"article","og_title":"Security Research Project","og_description":"Best practice for including public end users into security research projects","og_url":"https:\/\/leitat.org\/es\/blog\/best-practice-for-including-public-end-users-into-security-research-projects\/","og_site_name":"Leitat Technological Center","article_published_time":"2015-11-11T15:41:10+00:00","article_modified_time":"2025-02-24T21:56:20+00:00","og_image":[{"width":2560,"height":1912,"url":"https:\/\/leitat.org\/wp-content\/uploads\/2015\/11\/image2-scaled.jpg","type":"image\/jpeg"}],"author":"Comunicaci\u00f3n Leitat","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Comunicaci\u00f3n Leitat","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/leitat.org\/es\/blog\/best-practice-for-including-public-end-users-into-security-research-projects\/#article","isPartOf":{"@id":"https:\/\/leitat.org\/es\/blog\/best-practice-for-including-public-end-users-into-security-research-projects\/"},"author":{"name":"Comunicaci\u00f3n Leitat","@id":"https:\/\/leitat.org\/es\/#\/schema\/person\/ca8dc97489cd821df9e0c42930e89131"},"headline":"Best practice for including public end users into Security Research Projects","datePublished":"2015-11-11T15:41:10+00:00","dateModified":"2025-02-24T21:56:20+00:00","mainEntityOfPage":{"@id":"https:\/\/leitat.org\/es\/blog\/best-practice-for-including-public-end-users-into-security-research-projects\/"},"wordCount":114,"publisher":{"@id":"https:\/\/leitat.org\/es\/#organization"},"image":{"@id":"https:\/\/leitat.org\/es\/blog\/best-practice-for-including-public-end-users-into-security-research-projects\/#primaryimage"},"thumbnailUrl":"https:\/\/leitat.org\/wp-content\/uploads\/2015\/11\/image2-scaled.jpg","keywords":["Noticias Blog"],"articleSection":["Energy transition and decarbonization"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/leitat.org\/es\/blog\/best-practice-for-including-public-end-users-into-security-research-projects\/","url":"https:\/\/leitat.org\/es\/blog\/best-practice-for-including-public-end-users-into-security-research-projects\/","name":"Security Research Project","isPartOf":{"@id":"https:\/\/leitat.org\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/leitat.org\/es\/blog\/best-practice-for-including-public-end-users-into-security-research-projects\/#primaryimage"},"image":{"@id":"https:\/\/leitat.org\/es\/blog\/best-practice-for-including-public-end-users-into-security-research-projects\/#primaryimage"},"thumbnailUrl":"https:\/\/leitat.org\/wp-content\/uploads\/2015\/11\/image2-scaled.jpg","datePublished":"2015-11-11T15:41:10+00:00","dateModified":"2025-02-24T21:56:20+00:00","description":"Best practice for including public end users into security research projects","breadcrumb":{"@id":"https:\/\/leitat.org\/es\/blog\/best-practice-for-including-public-end-users-into-security-research-projects\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/leitat.org\/es\/blog\/best-practice-for-including-public-end-users-into-security-research-projects\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/leitat.org\/es\/blog\/best-practice-for-including-public-end-users-into-security-research-projects\/#primaryimage","url":"https:\/\/leitat.org\/wp-content\/uploads\/2015\/11\/image2-scaled.jpg","contentUrl":"https:\/\/leitat.org\/wp-content\/uploads\/2015\/11\/image2-scaled.jpg","width":2560,"height":1912,"caption":"Connect EU 2"},{"@type":"BreadcrumbList","@id":"https:\/\/leitat.org\/es\/blog\/best-practice-for-including-public-end-users-into-security-research-projects\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"HOME","item":"https:\/\/leitat.org\/es\/home\/"},{"@type":"ListItem","position":2,"name":"Energy transition and decarbonization","item":"https:\/\/leitat.org\/es\/blog\/category\/energy-transition-and-decarbonization\/"},{"@type":"ListItem","position":3,"name":"Best practice for including public end users into Security Research Projects"}]},{"@type":"WebSite","@id":"https:\/\/leitat.org\/es\/#website","url":"https:\/\/leitat.org\/es\/","name":"Leitat Technological Center","description":"Managing Technologies","publisher":{"@id":"https:\/\/leitat.org\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/leitat.org\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/leitat.org\/es\/#organization","name":"Leitat Technological Center","url":"https:\/\/leitat.org\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/leitat.org\/es\/#\/schema\/logo\/image\/","url":"https:\/\/leitat.org\/wp-content\/uploads\/2024\/10\/logo-leitat.svg","contentUrl":"https:\/\/leitat.org\/wp-content\/uploads\/2024\/10\/logo-leitat.svg","width":226,"height":78,"caption":"Leitat Technological Center"},"image":{"@id":"https:\/\/leitat.org\/es\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/leitat.org\/es\/#\/schema\/person\/ca8dc97489cd821df9e0c42930e89131","name":"Comunicaci\u00f3n Leitat","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/ce5e10560c8753dc6a31f108c84f08103b3e4bb78f97dde95a1445d45abbb09a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ce5e10560c8753dc6a31f108c84f08103b3e4bb78f97dde95a1445d45abbb09a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ce5e10560c8753dc6a31f108c84f08103b3e4bb78f97dde95a1445d45abbb09a?s=96&d=mm&r=g","caption":"Comunicaci\u00f3n Leitat"},"sameAs":["https:\/\/leitat.org"],"url":"https:\/\/leitat.org\/es\/blog\/author\/comunica-wp\/"}]}},"_links":{"self":[{"href":"https:\/\/leitat.org\/es\/wp-json\/wp\/v2\/posts\/4886","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/leitat.org\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/leitat.org\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/leitat.org\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/leitat.org\/es\/wp-json\/wp\/v2\/comments?post=4886"}],"version-history":[{"count":3,"href":"https:\/\/leitat.org\/es\/wp-json\/wp\/v2\/posts\/4886\/revisions"}],"predecessor-version":[{"id":42095,"href":"https:\/\/leitat.org\/es\/wp-json\/wp\/v2\/posts\/4886\/revisions\/42095"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/leitat.org\/es\/wp-json\/wp\/v2\/media\/4888"}],"wp:attachment":[{"href":"https:\/\/leitat.org\/es\/wp-json\/wp\/v2\/media?parent=4886"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/leitat.org\/es\/wp-json\/wp\/v2\/categories?post=4886"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/leitat.org\/es\/wp-json\/wp\/v2\/tags?post=4886"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}