WWW.THESES.XLIBX.INFO
FREE ELECTRONIC LIBRARY - Theses, dissertations, documentation
 
<< HOME
CONTACTS



Pages:     | 1 || 3 | 4 |   ...   | 9 |

«COOPERATION THEME 10 SECURITY (European Commission C(2007)2460 of 11 June 2007) FP 7 Cooperation Work Programme: Security Changes to the Cooperation ...»

-- [ Page 2 ] --

Actions within the Security theme build not only on technology gain from the capability projects, and also on research outcomes of other themes of the 7th Framework Programme or of national research programmes. Only issues of European added value are covered in the theme and it is ensured that it is complementary with all other Community actions.

Complementarity with non-EU research will be ensured via the members of the Security Programme Committee configuration.

In general, a network of National Contact Points and in particular network(s) of security research stakeholders (including both the supply and the user side) are seen as instrumental in promoting the dissemination of security research to its end users, national public authorities and citizens alike. Suitable Coordination and support actions to achieve this could also receive funding (see in particular topics in activity 7).

Due to the sensitivity of the Security theme, the Rules for participation12 foresee the possibility of restrictions to the dissemination of the outcome of the actions on a case by case basis. Special provisions will be taken in the grant agreement.

For the Security Research Call 1, proposals must not contain any classified information. This would lead to declaring them ineligible immediately. However, it is possible that the output of COM(2005)705; Article 22

–  –  –

an action needs to be classified or classified inputs are required. In this case proposers have to ensure and provide evidence of the clearance of all relevant persons and facilities. Consortia have to clarify issues such as e.g. access to classified information or export or transfer control with the national authorities of their Member States / Associated Countries prior to submitting the proposal. Proposals need to provide a security aspect letter, indicating the levels of classification required. Appropriate arrangements have to be included in the consortium agreement.

All actions of the Security theme are in principle open to international co-operation to Industrialised countries as well as to ICPC13 countries. However, according to the Specific Programme, parts of the Work Programme can be restricted to EU and associated countries.

Such restriction is not foreseen in the 2007 Work Programme. At this stage, it is also not foreseen to have any ‘specific international co-operation actions’ in the Security theme.

Positively evaluated proposals involving sensitive and classified information, those involving international co-operation as well as those collaborative projects where 75% funding for all participants is foreseen will be flagged to the members of the Security Programme Committee configuration and dealt with according to its Rules for Procedure.

Ethical principles and gender aspects must always be taken into account. The pursuit of scientific knowledge and its technical application towards society requires the talent, perspectives and insight that can only be assured by increasing diversity in the research workforce. Therefore, a balanced representation of women and men at all levels in research projects is encouraged.

Cross-thematic approaches: For all four missions, security is often linked to the interoperability of systems (e.g. for command & control, networked critical infrastructures, border management & security etc.); and often interoperability is an ICT issue. Thus, a Joint Call for Proposals with Theme 3 Information and Communication Technologies is foreseen in 2007 in order to ensure comprehensive coverage.

Security issues could also be regarded as intrinsic elements of several of the other Cooperation themes. The scope of the calls has been carefully defined throughout the themes, in order to avoid gaps or duplication (with a view to the full duration of the 7th Framework Programme, not only the Security Research Call 1). Thus in case of doubt, whether a proposal is fully in scope with the topics presented under this theme, it is recommended to consult as well the Work Programmes of the other Co-operation themes.

Risk-sharing Finance Facility

In addition to direct financial support to participants in RTD actions, the Community will improve their access to private sector finance by contributing financially to the 'Risk-Sharing Finance Facility' (RSFF) established by the European Investment Bank (EIB).

The Community contribution to RSFF will be used, by the Bank, in accordance with eligibility criteria set out in the Work Programme 'Co-operation' (horizontal issues). RSFF ICPC: International Co-operation Partner Countries, see Annex 1.

–  –  –

support is not conditional on promoters securing grants resulting from calls for proposals described herein, although the combination of grants and RSFF-supported financing from EIB is possible.

In accordance with the Specific Programme 'Co-operation', which stipulates that the Community contribution to RSFF will be funded by proportional contributions of all Themes, except Socio-economic Sciences and the Humanities, the Commitment Appropriations for this Theme to RSFF in 2007 will be 4,428 M€. This amount will be committed entirely in 2007.

The use of the Community Contribution from the Specific Programme 'Co-operation' will be on a 'first come, first served' basis and will not be constrained by the proportional contribution of Themes.





Further information on the RSFF is given in the Annex 4 of this work programme.

Other activities The theme will support ERA-NET activities14 that develop the cooperation and coordination of research programmes carried out at national or regional level in the Member or Associated States through the networking of research programmes, towards their mutual opening and the development and implementation of joint activities.

ERA-NET projects can network four types of activities: (1) Information exchange – (2) Definition and preparation of joint activities – (3) Implementation of joint activities – (4)

Funding of joint trans-national research actions:

• ERA-NETs launched under FP6 wishing to submit a follow-up proposal under FP7 have to propose a strong coordination action focusing directly on steps three and four, in order to achieve mutual opening and trans-national research via joint/common calls, joint/common programmes or, if appropriate, other joint trans-national actions.

• New ERA-NETs, which address new topics and without any experience from FP6, should address at least the first three steps, but are encouraged to aim at the “four step approach”, as described above.

The Security Research Call 1 offers the possibility to submit a dedicated ERA-NET proposal under Topic SEC-2007-7.0-04 Transparency and networking amongst Member States and Associated Countries.

ERA-NET activities will be subject to a joint call across the Specific programme ‘Co-operation’ - see Annex 4.

–  –  –

II CONTENT OF CALLS IN 2007 II.1 Security Research Call 1 (FP7-SEC-2007-1) The primary ambition of the Security theme is to provide enhanced security related technologies, systems and systems of systems and to facilitate their take-up for the implementation of security policies and programmes as soon as possible.

Thus the Security Research Call 1 launches the implementation of two demonstration programmes (phases 1) in the two security policy missions Security of infrastructures and utilities and Intelligent surveillance and border security. They will demonstrate integrated innovative systems of systems (focus on highest level building block).

In parallel, and supporting this focus from the other building block levels, novel and improved technologies will be developed, adapted and integrated into systems to be ready for the next generation of integrated security systems of systems to be demonstrated for full scale take-up in the future.

Topic descriptions are deliberately kept rather brief and general in order to allow for a variety of promising technological approaches which may address more than one specific security application. This ensures that in principle more than one proposal can be selected for each topic, thus guaranteeing competition amongst proposals. It is also possible not to select any proposals submitted to a topic at all, if the quality is not sufficient and evaluators do not recommend it.

The Security Research Call 1 is open to the submission of proposals for actions referring to the following topics.

Activity 1: Increasing the Security of citizens The challenge of this activity is to contribute to combating the activities of organised crime (such as drug and weapons smuggling, complicated money laundering and child pornography trafficking schemes, individual and private sector fraud, illegal movement of equipment, technology and knowledge etc.) and terrorism by developing secure information and financial networks, robust secure communications and virtual policing of information infrastructures, including the internet, to uncover and track terrorist activities; to enhance the intelligence and analysis capabilities (capacity and quality) across a range of sectors in concert with digital forensic technology to track, trace and apprehend terrorists; with respect to terrorist weapons to detect, track, trace, identify and neutralise CBRNE (Chemical, Biological, Radiological, Nuclear agents and Explosives) – both ‘traditional’ and ‘home grown’. Speed, robustness and affordability will be the driving design parameters for technological and system solutions.

–  –  –

Area 1.1: Demonstration projects No demonstration programmes foreseen in this activity for Security Research Call 1.

See also chapter IV Indicative priorities for future calls.

Area 1.2: Integration projects Expected impact: While taking into account the mutual dependency of technology, organisational dynamics and human factors as well as related legal issues, actions in this area will achieve a substantial improvement with respect to performance, reliability, speed and cost.

They will also identify standardisation requirements and provide information concerning further research needs with a view to future security Work Programmes.

Through the performance of the integrated technology system, actions will allow product and service developers to verify and optimise their technologies at all development stages. This will reinforce their potential to create important market opportunities for European industry and establish leadership.

Actions will demonstrate the technology based potential for enhancing the effectiveness of European authorities in implementing their security policies and the capabilities of security forces. In addition, the actions will provide guidance for their implementation, including privacy relevant aspects.

The Security Research Call 1 calls for the following actions:

Topic SEC-2007-1.2-01 Intelligent urban environment observation system Technical content / scope: The task is to develop both a fixed and a man portable, integrated, fast, wide area behavioural observation system for individuals, platforms and goods in complex (urban) environments. It should meet surveillance and security tasks including compound security, trafficking of illegal goods, safety monitoring and evacuation on a 24h / 7 days basis. This will include the integration of sensor technologies, data fusion and intelligent observation systems to enable stand-off detection and analysis through barriers, of substances and weapons, of carriers and people as well as behaviour analysis to separate potential perpetrators from crowds and neutralise the threat.

Call: Security Research Call 1 Funding scheme(s): Collaborative project.

Topic SEC-2007-1.2-02 Integrated mobile security kit

Technical content / scope: The task is to develop an innovative and integrated, mobile security kit for rapid deployment, which can be applied to various situations such as large scale events (e.g. sport or show events) and to early warning / crisis response. The aim is to support and enhance the flexibility and adaptation capabilities of European security forces for preventing or responding to security incidents. This will involve sets of mobile security modules; tools for the protection of special persons; general security of events; interfacing with local security forces; multiple sensors etc.

Call: Security Research Call 1 Funding scheme(s): Collaborative project.

–  –  –

Area 1.3: Capability projects Expected impact: Actions in this area will provide the (adapted) technology basis and relevant knowledge for security capabilities needed in this (and also other) mission(s), as required by integrating industry and/or (private and/or public) end users, while achieving a significant improvement with respect to performance, reliability, speed and cost.

At the same time, actions will reflect the mutual dependency of technology, organisational dynamics, human factors, societal issues as well as related legal aspects. This will reinforce European industry’s potential to create important market opportunities and establish leadership, and it will ensure sufficient awareness and understanding of all relevant issues for the take-up of their outcome (e.g. regarding harmonisation and standardisation, potential classification requirements, international co-operation needs, communication strategies etc.) as well as for further research needs with a view to future security Work Programmes.

The Security Research Call 1 calls for the following actions:

Function: Detection, identification & authentication Topic SEC-2007-1.3-01 Stand off scanning and detection of hidden dangerous materials, objects or stowaways, fast and reliable alerting and specification.



Pages:     | 1 || 3 | 4 |   ...   | 9 |


Similar works:

«R E P O RT S E R I E S SUMMER 2012 Program Value in the Evolving Television Audience Marketplace Philip M. Napoli, Ph.D. Fordham University www.twcresearchprogram.com For more information: Fernando Laguarda 901 F Street, NW Suite 800 Washington, DC 20004 Phone: (202) 370-4245 www.twcresearchprogram.com twitter.com/TWC_RP Table of Contents Foreword By Fernando R. Laguarda, Time Warner Cable Introduction Part One: Market Information Regimes and Value Criteria in the Marketplace.6 1. Methodology...»

«Institut für Ethnologie und Afrikastudien Department of Anthropology and African Studies Arbeitspapiere / Working Papers Nr. 102 Bianca Volk „Talking about Marriage.“. Polizeiarbeit in Upper West, Ghana The Working Papers are edited by Institut für Ethnologie und Afrikastudien, Johannes Gutenberg-Universität, Forum 6, D-55099 Mainz, Germany. Tel. +49-6131-3923720; Email: ifeas@uni-mainz.de; http://www.ifeas.uni-mainz.de http://www.ifeas.uni-mainz.de/workingpapers/Arbeitspapiere.html...»

«March 2011 A monthly sitrep. for the Rhodesian Services Association Incorporated Registered under the 2005 Charities Act in New Zealand number CC25203 Registered as an Incorporated Society in New Zealand number 2055431 PO Box 13003, Tauranga 3141, New Zealand. Web: www.rhodesianservices.org Secretary’s e-mail thesecretary@rhodesianservices.org Editor’s e-mail theeditor@rhodesianservices.org Phone +64 7 576 9500 Fax +64 7 576 9501 Please Note that all previous publications are available on...»

«The World’s Most Important Gathering of CIOs and Senior 16 – 20 October 2016 | Orlando, Florida IT Executives gartner.com/us/symposium Gartner Symposium/ITxpo Hotel Accommodations How do I register for the event? Please visit our Symposium Registration page at http://www.gartner.com/technology/symposium/ orlando/register.jsp or call our Symposium Registration Team at 1-866-405-2511. When can I make my hotel reservation?• If you are an Executive Programs Attendee, we have a priority...»

«Kentucky Department of Education 2014 SBDM Council Frequently Asked Questions 1. ROLES AND RESPONSIBLITIES What are the responsibilities for a district SBDM Coordinator?The district SBDM coordinator role is two-fold: • As a liaison between the district central office and the school councils; and • As a liaison between the district and the Kentucky Department of Education. What are the responsibilities of SBDM members? Chairperson The position of the chairperson for a school council is the...»

«Private Equity Firms’ Reputational Concerns and the Costs of Debt Financing Rongbing Huang, Jay R. Ritter, and Donghang Zhang∗ February 20, 2014 forthcoming, Journal of Financial and Quantitative Analysis Abstract A popular view is that private equity (PE) firms tend to expropriate other stakeholders of their portfolio companies. Bonds offered during 1992-2011 by companies after their initial public offerings (IPOs) do not reflect this view. We find that yield spreads on bonds offered by...»

«ü «. »-–,;:.() English Grammar & Style A Handbook for South Tyrol / Südtirol English Grammar & Style 2 Introduction This handbook is intended principally for English translators working in South Tyrol. Nowadays non-native speakers have to work more and more with English, especially on websites. The aim of this guide is to provide this broader audience with the tools needed to avoid common mistakes that lower text quality. English Grammar & Style 3 Index 1. General p. 4 2. Capital Letters...»

«IDEA MAN A MEMOIR BY THE COFOUNDER OF MICROSOFT PA U L AL L E N PORTFOLIO/PENGUIN IDEA MAN A MEMOIR BY THE COFOUNDER OF MICROSOFT PA U L AL L E N PORTFOLIO/PENGUIN Grateful acknowledgment is made for permission to reprint an excerpt from “Purple Haze,” written by Jimi Hen­ library of congress cataloging in publication data Allen, Paul, 1953– Idea man : a memoir by the cofounder of Microsoft / Paul Allen. Set in Sabon Lt Std Designed by Jaime Putorti Without limiting the rights under...»

«Appendix 1 Environment Committee Charging ahead? An overview of progress in implementing the Mayor's Electric Vehicle Delivery Plan February 2012 Environment Committee Charging ahead? An overview of progress in implementing the Mayor's Electric Vehicle Delivery Plan Environment Committee Charging ahead? An overview of progress in implementing the Mayor's Electric Vehicle Delivery Plan February 2012 Copyright Greater London Authority February 2012 Published by Greater London Authority City Hall...»

«burgman 400 zubehör burgman 400 zubehör Zubehör Burgman 400 Info über Zubehör Burgman 400. Info über Zubehör Burgman 400. Suchen in 6 Suchmaschinen Zugleich! Burgman 400 Zubehör | Burgman 400 Zubehör.idealo.de Preis Burgman 400 Zubehör vergleichen! Burgman 400 Zubehör | iZito.de Bekomm burgman 400 zubehör Info Von 6 Suchmaschinen Zugleich Suzuki Burgman 400 Ersatzteile Zubehör | Shop Die Suzuki Experten. Alle Ersatzteile und Zubehör für Suzuki Burgman 400 AN400 ABS Inj. 09schnell...»

«UNGASS REPORT Sri Lanka 2008-2009 United Nations General Assembly Special Session on HIV/AIDS COUNTRY PROGRESS REPORT SRI LANKA 2008-2009 United Nations General Assembly Special Session on HIV/AIDS COUNTRY PROGRESS REPORT SRI LANKA Reporting period: January 2008-December 2009 I. Table of Contents List of acronyms Status at a glance Overview of the AIDS epidemic National response to the AIDS epidemic Best practices Major challenges and remedial actions Support from the country’s development...»

«STUDY ASSISTANCE GUIDELINES for Professional, Document Services, Grounds and Security Staff Human Resources Unit Updated October 2014 TABLE OF CONTENTS Page number OVERVIEW ELIGIBILITY GUIDING PRINCIPLES AND APPROACH RELEVANT TERMS STUDY RELEASE STUDY RELEASE APPLICATION PROCESS FINANCIAL SUPPORT FINANCIAL SUPPORT APPLICATION PROCESS APPEALS RESPONSIBILITIES AND AUTHORITIES ASSOCIATED DOCUMENTS FURTHER ASSISTANCE APPENDIX 1: Applying for Study Release APPENDIX 2: Applying for Financial...»





 
<<  HOME   |    CONTACTS
2016 www.theses.xlibx.info - Theses, dissertations, documentation

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.