*3.3.3 Assess data quality*

*Issues on Risk Analysis for Critical Infrastructure Protection*

evaluation purposes.

5.Define how the results will be reported.

development processes and their outcomes.

testing consisting of the following three substeps.

users and its details are discussed.

*3.3.2 Conduct validation exercise*

**3.3 Business case implementation**

*3.3.1 Plan the business case*

In order to achieve an effective evaluation outcome, the selection of the

4.Define the tools to be used to collect the results and feedback comprising:

The results will be presented in suitable style and form, according to the reporting target audience and the selected tool. All reporting activities will be planned accordingly, paying attention to the most suitable communication means for the specific audience, in terms of content presentation, type of language, level of details and so on. For example, the elaboration of the questionnaires, the feedback from the interviews of the focus groups and the conclusions of the debriefing sessions (hot and cold washes) of BCs will be documented based on standardized feedback sheets which will be analyzed to improve the overall specification and

The third part that will be followed in the validation plan, is that of that of the BC pilots execution, including both preparatory meetings and the actual field

1.End-users (internal and external) are identified specifically for each BC.

3.Send invitations, share information for the pilot with involved stakeholders.

4.Before the pilot, organize a training course, for the participants to have the

5.The scenario (depending on the area of application) is presented to the end-

6.All necessary adaptations, installations, integrations have been achieved and

Following the specific BC scenario storyline, the involved actors are guided and supported by the capabilities of the SecureGas system in order to respond to a

2.Identify the place and date and estimate the budget-plan logistics.

opportunity to familiarize with the SecureGas solution.

the system is ready to be used, demonstrated and evaluated.

• KPIs and respective traceability matrices, for validation purposes, and

• survey questionnaires, focus groups, interviews and brainstorming, for

scenario, adequate qualification, objectivity, previous experience.

stakeholders, must be based on some requirements, such as the relevance to the

**136**

security incident.

Following the BCs pilots' implementation, the participants are asked to use the validation/evaluation tool/method (e.g. fill a specifically designed questionnaire, see Section 4). In some cases, interviews are held.

The assessment of results and feedback gathered leads to a holistic evaluation outcome, respective lessons identified and recommendations for further analysis.
