WWW.THESES.XLIBX.INFO
FREE ELECTRONIC LIBRARY - Theses, dissertations, documentation
 
<< HOME
CONTACTS



Pages:   || 2 | 3 | 4 | 5 |   ...   | 9 |

«COOPERATION THEME 10 SECURITY (European Commission C(2007)2460 of 11 June 2007) FP 7 Cooperation Work Programme: Security Changes to the Cooperation ...»

-- [ Page 1 ] --

WORK PROGRAMME 2007-2008

COOPERATION

THEME 10

SECURITY

(European Commission C(2007)2460 of 11 June 2007)

FP 7 Cooperation Work Programme: Security

Changes to the Cooperation Work Programme: Security Theme

This work programme replaces the version adopted on 26 February 2007.

The only substantive modifications that have been made to the content are as follows:

• Pages 42 and 44: Addition of 76,2 M€ from the 2008 budget to Call FP7-SEC-2007-1

• Pages 42 and 49: Addition of 20 M€ from the 2008 budget to Call FP7-ICT-SECPage 1 of 53 FP 7 Cooperation Work Programme: Security THEME 10: SECURITY Table of contents I CONTEXT …………………………...……………………………..……….... 3 II CONTENT OF CALLS IN 2007 …………..…………………………….… 10 II.1 Security Research Call 1 (FP7-SEC-2007-1) …………………………………. 10 Activity 1: Increasing the Security of citizens …………….....…..…… 10 Area 1.1: Demonstration projects Area 1.2: Integration projects Area 1.3: Capability projects Activity 2: Increasing the Security of infrastructures and utilities ….....… 15 Area 2.1: Demonstration projects Area 2.2: Integration projects Area 2.3: Capability projects Activity 3: Intelligent surveillance and enhancing border security …..….... 19 Area 3.1: Demonstration projects Area 3.2: Integration projects Area 3.3: Capability projects Activity 4: Restoring security and safety in case of crisis …………….….. 24 Area 4.1: Demonstration projects Area 4.2: Integration projects Area 4.3: Capability projects Activity 5: Improving Security systems integration, interconnectivity and interoperability ……………………………………….….. 27 Activity 6: Security and society …………………..…………….……..….. 28 Area 6.1: Citizens and Society Area 6.2: Understanding organisational structures and cultures of public users Area 6.3: Foresight, scenarios and security as an evolving concept Area 6.4: Security Economics

–  –  –

III.1 Security Research Call 1 (FP7-SEC-2007-1) ……………………….…..……. 44 III.2 Joint Call ICT & Security 1 (FP7-ICT-SEC-2007-1) …..……………….……. 49

–  –  –

THEME 10: SECURITY Objective The objective of the Security theme is: to develop the technologies and knowledge for building capabilities needed to ensure the security of citizens from threats such as acts of terrorism and (organised) crime, natural disasters and industrial accidents while respecting fundamental human rights including privacy; to ensure optimal and concerted use of available and evolving technologies to the benefit of civil European security; to stimulate the cooperation of providers and users for civil security solutions; to improve the competitiveness of the European security industry and to deliver mission-oriented results to reduce security gaps.

The Security theme will maintain an exclusively civil orientation and focus on activities of clear European added value.

This 2007 security research Work Programme has been given an emphasis towards research activities related to border security and to the security of critical infrastructures and utilities.

–  –  –

Policy context As a primary policy context, the Security theme provides contributions to the implementation of EU external policy1, for creating an EU-wide area of justice, freedom and security2, and for policy areas such as transport3, health4, civil protection5 (including natural and industrial disasters), energy6 and environment7.

A secure European framework is the basis for planning our lives, for economic investments, for prosperity and freedom. Thus the Security theme in a secondary policy context also contributes to growth and employment in general and the competitiveness of European industry.

The respect of privacy and civil liberties is a guiding principle throughout the theme.

The Security theme facilitates the various national and international actors to co-operate and coordinate in order to avoid unnecessary duplication and to explore synergies wherever possible. Furthermore, the Commission will ensure full complementarity with other http://ec.europa.eu/comm/external_relations/reform/intro/ip04_1151.htm;

http://ec.europa.eu/comm/external_relations/cfsp/intro/index.htm;

http://ec.europa.eu/justice_home/fsj/intro/fsj_intro_en.htm;

http://ec.europa.eu/dgs/energy_transport/security/index_en.htm;

http://ec.europa.eu/health/ph_threats/com/preparedness/preparedness_en.htm;

http://ec.europa.eu/environment/civil/index.htm;

http://ec.europa.eu/dgs/energy_transport/security/index_en.htm;

http://ec.europa.eu/dgs/environment/index_en.htm;

Page 3 of 53 FP 7 Cooperation Work Programme: Security

Community initiatives and avoid duplication (e.g. with the 'Framework Programme on Security and Safeguarding Liberties': Actions under the Security theme are rather methodology and technology oriented, while the mentioned Framework Programme focuses on actions related to policy and operational work in the area of law enforcement and combating and preventing crime/terrorism).





Approach

The following paragraphs explain the underpinning logic of how the Security theme is organised with respect to structuring its scope and content as well as to sequencing the content in a series of Work Programmes. Experience and consultations of the Commission’s Preparatory Action for Security Research (PASR, 2004-2006)8 are also taken into account.

Scope and content of the Security theme

Following the recommendations of the Commission’s European Security Research Advisory Board (ESRAB)9, the Security theme addresses four security missions of high political relevance which relate to specific security threats. It contributes to building up the necessary capabilities – ESRAB identified 120 capabilities organised in 11 functional groups10 - of the persons and organisations responsible for safeguarding security in these mission areas by funding the research that will deliver the required technologies and knowledge to build up these capabilities. It is clear however, that “technology itself cannot guarantee security, but security without the support of technology is impossible” and that the use of security related technologies must always be embedded in political action. To support such action and also to improve the effectiveness and efficiency of the technology related research, three domains of

cross-cutting interest were selected as well:

Missions:

1. Security of citizens

2. Security of infrastructures and utilities

3. Intelligent surveillance and border security

4. Restoring security and safety in case of crisis

Cross cutting:

5. Security systems integration, interconnectivity and interoperability

6. Security and society

7. Security Research coordination and structuring COM(2004)72; http://cordis.europa.eu/security/;

ESRAB Report: Meeting the Challenge: the European Security Research Agenda. A report from the European Security Research Advisory Board, September 2006. ISBN 92-79-01709-8.

For complete list of functions see chapter IV. Research with relevance for the security capabilities is also done elsewhere in the Framework Programme or outside.

–  –  –

Ambition and theme architecture: Routes to meet the objectives The Security theme aims at meeting its main objectives – improved security for the citizens, enhanced competitiveness for industry - as substantiated in the topics of its ‘demonstration projects‘ which will be the ’flagships‘ of the Security theme. Successful demonstration of the appropriateness and performance of novel solutions is a key factor for the take-up of the output of the research work and its implementation by security policies and measures.

Technology oriented research in the Security theme consists of several building blocks, representing three – in some cases parallel, in others subsequent - routes that contribute to the

overall objectives (see figure 1):

–  –  –

Phase 1 with a duration of 1 – 1,5 years will define their strategic roadmaps and Figure 1: Research routes to meet the trigger EU wide awareness, both elements Security theme objectives involving strategic public and private end users as well as industry and research. The strategic roadmaps will take into account relevant completed, ongoing and planned work and indicate further research needs for Security theme integration projects and capability projects, but as well for other themes of the 7th Framework Programme or for the national level. The funding scheme that applies to demonstration projects phase 1 is coordination and support actions.

Phase 2 will then technically implement the system of systems demonstration projects, taking already into account steps which have to follow the research like standardisation, development of marketable products and procurement. This will mobilise a significant volume of resources, the typical duration is up to 4 years. The funding scheme that applies to demonstration projects phase 2 is collaborative projects.

Page 5 of 53 FP 7 Cooperation Work Programme: Security

- On the medium level of the building block structure, integration projects aim at mission specific combination of individual capabilities providing a security system and demonstrating its performance. They depend upon the technology and knowledge building blocks carried out within the capability projects or elsewhere. Their average duration is 4 years. The funding scheme that applies to integration projects is collaborative projects.

- On the lowest level of the building block structure, capability projects aim at building up and/or strengthening security capabilities required in the four security missions. This will be done through adaptation of available technology as well as the development of security specific technology and knowledge. In many cases these will also have cross-mission relevance. Their average duration is 2-4 years. The funding scheme that applies to capability projects is collaborative projects.

For the cross-cutting domains of the Security theme, actions can be both self standing or linked to the missions in activities 1 to 4, and society relevant research issues can also be integrated in technology projects. Concerning activity Security systems integration, interconnectivity and interoperability collaborative projects are regarded as the appropriate funding scheme, with characteristics and sizes comparable to the capability projects.

Collaborative projects can be chosen as funding scheme for Security and society actions, but coordination and support actions apply as well. For activity Security Research coordination and structuring, the most appropriate funding scheme will be coordination and support actions. Core activities will be studies; networking; exchanges of personnel; exchange and dissemination of good practices; the definition and organisation of joint or common initiatives; meetings, conferences and events etc. and the management of the action.

The use of Networks of Excellence and Joint Technology Initiative funding schemes is not foreseen at this stage.

Concerning the collaborative project funding scheme in the Security theme, the Community funding may reach a maximum of 75% in cases with very limited market size and a risk of "market failure" and for accelerated equipment development in response to new threats.11 If proposers wish to claim this higher funding level, it will be their task to demonstrate in their proposal that the required conditions apply. The final decision will be based on the recommendations of the relevant evaluation panel.

The forms of the grant to be used for the funding schemes for the Security theme are given in Annex 3.

Decision 1906/2006/Ec of 18/12/2006 on the rules for participation, Art 33.1

–  –  –

Principles and characteristics of Security theme actions This Security theme has high political relevance both for security related and economic policy areas (growth, employment etc.). While building on a strategic research agenda, it is always open for well justified unforeseen policy needs. It should also support the (re)structuring of the European security sector.

All actions are open to the participation of all security stakeholders: industry including SMEs (small and medium enterprises), research organisations, universities, as well as public authorities, non-governmental organisations and public and private organisations in the security domain. With a view to the Security theme’s objective of increasing the competitiveness of industry, the broad involvement of SMEs in consortia is highly encouraged. The performance and integration of SMEs is furthermore supported through dedicated measures, in particular SEC-2007-7.0-01, SEC-2007-7.0-05 and SEC 7.0-06. In order to ensure that the outcome of the research carried out under the Security theme does in particular contribute to meeting the theme’s other main objective, the improvement of the security of the citizens, co-operation between the user side (authorities and organisations responsible for the security of the citizens) and the supply side of security technologies and solutions must be promoted. Thus the active involvement of end users in consortia is considered of utmost importance.

Security theme actions should be multidisciplinary and mission-oriented. A multi-purpose nature of technologies is encouraged to maximise the scope for their application, and to foster cross-fertilisation and take-up of existing and emerging technologies for the civil security sector. Recognizing that Security research covers areas of dual use technology relevant to both civilian and military applications, coordination with the European Defence Agency (EDA), who will consult its Member States about national programmes, will ensure complementarity wherever necessary.



Pages:   || 2 | 3 | 4 | 5 |   ...   | 9 |


Similar works:

«INDIAN RIVER COUNTY (Unincorporated County) CONCURRENCY DETERMINATION APPLICATION Note: Incomplete applications will be returned without further processing. Applications for initial or initial/final concurrency certificates will expire if applicable impact fees and capacity charges are not paid and appropriate department approvals are not obtained within twelve (12) months from the date an application is received by the planning division. COMPLETE AS INDICATED AND SUBMIT TO THE INDIAN RIVER...»

«CENTRO AGRONÓMICO TROPICAL DE INVESTIGACIÓN Y ENSEÑANZA PROGRAMA DE ENSEÑANZA PARA EL DESARROLLO Y LA CONSERVACIÓN ESCUELA DE POSGRADUADOS Oportunidades y limitaciones para el posicionamiento de pequeños cafetaleros de Costa Rica y sus empresas asociativas en mercados de cafés diferenciados Tesis sometida a consideración de la Escuela de Posgrado. Programa de Educación para el Desarrollo y la Conservación del Centro Agronómico Tropical de Investigación y Enseñanza y como requisito...»

«Listado de Falsos Antivirus / Falsos Antispywares / Rogue Software http://www.forospyware.com/t5.html El siguiente listado fue generado y es mantenido por el equipo de ForoSpyware.com con colaboración de SpywareWarrior (lugar donde se origino el primer listado oficial y el cual se encuentra descontinuado desde Abril del 2007), por lo que desde esa fecha en más, los programas listados son enteramente de nuestra responsabilidad e investigación. Si tiene cualquiera de estos programas...»

«OXFAM CASE STUDY MAY 2015 A government sign highlighting the newly designated 'no build zone' along the coast in Candahue, Leyte. Photo: Laura Eldon/Oxfam TYPHOON HAIYAN Community research into the relocation of internally displaced people in the Philippines In February and March 2014, Oxfam carried out field research in the Philippines with people displaced by typhoon Haiyan in order to inform and influence the government-led process for their relocation. The project tested out a cyclical...»

«EmmanuEl CollEgE ChapEl miChaElmas TErm 2015 Emmanuel College Chapel The Chapel exists as a centre for Christian life and worship. It stands in the centre of the College as a reminder of the spiritual dimension to life, whether we are conventionally religious or not. All members of the College and their friends are very welcome at its services, and are invited to share in its activities. Regular Services Sunday 11 am – The Eucharist The Eucharist is the distinctive act of the Christian...»

«Twin Pipe PVC / CPVC Venting options for Rinnai Ultra Series Condensing Tankless Water Heaters.Purpose: The purpose of this presentation is to provide information concerning new venting options available for the following Rinnai Ultra Series Tankless Water Heater models.• RU98i (REU-KB3237FFUD-US) • RU80i (REU-KB2530FFUD-US) NOTE: The information contained in this presentation is an overview and applies only to the Rinnai Ultra Series water heater models listed above. For more complete...»

«Fixed Costs, Network Effects, and the International Diffusion of Containerization* Gisela Rua† University of California, Berkeley May 8, 2012 Abstract Containerization is one of the most important innovations affecting the conduct of international trade in the second half of the twentieth century. This paper analyzes its international diffusion and the factors that shaped today’s container network. I construct a new dataset with information on the timing and intensity of adoption of...»

«Better Learning Better Future Education And Training Sector Strategy For The Pacific It will prevent to be because but a factoring and adverse gut. To see Better Learning Better Future Education And Training Sector Strategy for the Pacific market license in the general positions it are to work the best on your month. Also, a means want completely Better Learning Better Future Education And Training Sector Strategy for the Pacific satisfy with the room is great loans of the pattern. By...»

«Currículum Vitae Período 2009-2013 Pilar Gayan Sanz Febrero 2014 Apellidos: GAYAN SANZ Nombre: PILAR DNI: 25.148.879-N Fecha de nacimiento : 04-10-67 Sexo: M 1.Situación profesional actual Organismo: Consejo Superior de Investigaciones Científicas (CSIC). Facultad, Escuela o Instituto: Instituto de Carboquímica. Departamento: Energía y medioambiente Dirección: C/ Miguel Luesma Castán, 4, 50018 Zaragoza Teléfono: 976 733977 Correo electrónico: pgayan@icb.csic.es Especialización (Cód....»

«BE SURE – THE IMPORTANCE OF CONFIDENCE IN PROJECT MANAGEMENT JAN SANDBACKA [F-SECURE CORPORATION] 1. ABSTRACT Beliefs have a strong physiological impact on the human behavior. They have a self-fulfilling prophecy effect. People’s beliefs usually come true, because they act as if those beliefs would be true. Thus, it helps them to reach their goals. Right beliefs are important in the project management. It is especially important that project managers believe in their projects and their...»

«LAN AIRLINES | Presidente Riesco 5711, piso 3, Santiago, Chile | (56 2) 565 3726 |www.lan.com An overview of LAN Airlines Note: The following document contains general information about the company and its affiliates, which can be used as support in future publications. The information is current to septembrer 2013 and is considered public. About LATAM Airlines Group • PERSONNEL: More than 53.000 employees.• FLEET: 307 passenger planes Airbus 340: 3 Airbus 330/321/320/319: 240 Boeing 767...»

«Regulation as a Cause of Firm Fragmentation: The Case of the Spanish Construction Industry MANUEL GONZ´ LEZ A University of Oviedo, Oviedo, Spain E-mail: mgdiaz@econo.uniovi.es BENITO ARRU˜ ADA ALBERTO FERN´ NDEZ N AND A Pompeu Fabra University, Barcelona, Spain E-mail: benito.arrunada@econ.upf.es E-mail: alberto.fernandez@econ.upf.es Team members organize their relationships to achieve efficient incentives in accordance with institutional constraints. When these constraints change, the...»





 
<<  HOME   |    CONTACTS
2016 www.theses.xlibx.info - Theses, dissertations, documentation

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.