WWW.THESES.XLIBX.INFO
FREE ELECTRONIC LIBRARY - Theses, dissertations, documentation
 
<< HOME
CONTACTS



Pages:     | 1 |   ...   | 4 | 5 || 7 | 8 |   ...   | 9 |

«COOPERATION THEME 10 SECURITY (European Commission C(2007)2460 of 11 June 2007) FP 7 Cooperation Work Programme: Security Changes to the Cooperation ...»

-- [ Page 6 ] --

Research in this area will ensure that selected policies and technologies are responsive to the needs of the citizens, and that they create security approaches that are rooted and acceptable by society and citizens, with differing cultural backgrounds. It will contribute to taking into account the human factor, people’s behaviour, the interactions between citizens and authorities in security management or crisis situations and it will address radicalisation risks, terrorist behaviour and activity etc. Thus it will provide authorities as well as future technology related research with valuable information and recommendations to improve their performance.

–  –  –

Topic SEC-2007-6.1-01 Understanding factors that cause citizens’ feeling of security and insecurity Technical content / scope: In order to devise effective and long term security strategies and policies, a clear view as to how society perceives security and insecurity is required. The task is to study the factors which determine society’s perception of security and/or insecurity and then to propose a method for implementation such that the results could guide and inform European and national policy formulation.

Call: Security Research Call 1 Funding scheme(s): Collaborative project and Coordination and support action (aiming at supporting research activities).

Topic SEC-2007-6.1-02 Human behaviour before, during and after crisis situations to understand how people react to threat alerts and security instructions Technical content / scope: The task is to carry out research into improving the understanding of people’s behaviour in both crisis and ‘steady-state’ situations. The aim is to best tailor security related communication and instructions with a view to improving evacuation and protection activities. Actions will also address specific needs and appropriate timing with respect to people from differing faith, religious and cultural backgrounds from the survivors, casualties, deceased victims and bereaved families to workers, first responders and affected communities.

Call: Security Research Call 1 Funding scheme(s): Collaborative project and Coordination and support action (aiming at supporting research activities).

Topic SEC-2007-6.1-03 Communication strategies of public authorities (including media strategies) before, during and after crises concerning risks, security threats and measures Technical content / scope: In the case of crises, citizens are more likely to take coherent, correct and timely action if governments have the ability to communicate risk, threats and security measures in a focussed and optimised way. The task is to develop appropriate communication strategies in particular for public authorities and the media, taking into account all phases of a security incident and considering the influence of differing faith, religious and cultural backgrounds from the survivors, casualties, deceased victims and bereaved families to workers, first responders and affected communities.

Call: Security Research Call 1 Funding scheme(s): Collaborative project and Coordination and support action (aiming at supporting research activities).

–  –  –

Area 6.2: Understanding organisational structures and cultures of public users An objective European joint security capability to handle security matters has to be based upon the resources and mandates of the Member States and Associated Countries.

The distinct national systems must be interoperable, scaleable and allow for mobility where appropriate.

Research under this area will regard the organisational structures, behavioural and cultural issues of end user organisations in order to ensure applicability, user friendliness and affordability of security technologies and solutions. It will also improve applicability concerning political accountability and democratic control aspects of public services within the security arena.

Topic SEC-2007-6.2-01 Behavioural, organisational and cultural issues to understand public user needs including those for joint European action Technical content / scope: The tasks are (a) to assess the specific needs of private and public end users with a view to applicability, user friendliness and affordability of the results of the security research results of the 7th Framework Programme; (b) to carry out research into the organisational structures and distinct cultures of the numerous, complex and diverse public user organisations in order to successfully integrate them into research and development of security technologies; (c) analysing the consequences on the political, institutional, organisational and human elements underpinning technology based security policies and programs.

Call: Security Research Call 1 Funding scheme(s): Collaborative project and Coordination and support action (aiming at supporting research activities).

Topic SEC-2007-6.2-02 Inventories of existing national resources, institutional mandates and practices across relevant sectors Technical content / scope: The task is to address the need for general/operational interoperability, scalability and where appropriate mobility of the Member States’ and Associated States’ distinct national systems, in order to achieve an effective joint European capability to handle civil security issues. This will include in particular institutional design and issues concerning conflicting/complementary mandates and resources/best practices, in order to achieve better European connectivity between the existing national systems. The research should take into account behavioural, organisational and cultural issues that can have an impact on the effectiveness of public users, in particular linguistic barriers or stovepipe sectoral approaches.





Call: Security Research Call 1 Funding scheme(s): Collaborative project and Coordination and support action (aiming at supporting research activities).

–  –  –

Area 6.3: Foresight, scenarios and security as an evolving concept The security domain is ‘by definition’ one with broad uncertainty even within the most nearsighted time horizon; foresight studies and scenario building techniques are therefore very much needed for all missions.

Research under this area will improve our understanding of novel threats as well as technological opportunities and emerging security related ethical, cultural and organisational challenges. It will help authorities to assess investment alternatives for prevention or preparedness and to make the appropriate trade-offs between security and other societal objectives such as the right to privacy and social cohesion.

Topic SEC-2007-6.3-01 Research in broad societal foresight to capture new and emerging threats as well as other aspects of security as an evolving concept (e.g. ethical and economic aspects) Technical content / scope: The tasks are (a) to use foresight methods to address novel threats and technological opportunities and also emerging security related ethical, cultural and organisational challenges; (b) to apply scenario building techniques for systemic risk analysis as well as to inspire public debate and to foster shared understanding and self-organisation among stakeholders; (c) to address security as an evolving concept with a view to integrating diverse strands of research work and results in order to guide, orientate and structure future security related research activities.

Call: Security Research Call 1 Funding scheme(s): Collaborative project and Coordination and support action (aiming at supporting research activities).

Topic SEC-2007-6.3-02 Research on rigorous methodologies for assessment of security investments and trade-off between security and other societal objectives (e.g. privacy and social cohesion) Technical content / scope: The task is to develop foresight based methodologies for the rigorous assessment of investment alternatives, intended to prevent or mitigate insecurities with uncertain and potentially catastrophic ramifications. Both financial costs as well as the trade-off between security and other societal objectives, such as the right to privacy and social cohesion, should be addressed.

Call: Security Research Call 1 Funding scheme(s): Collaborative project and Coordination and support action (aiming at supporting research activities).

Area 6.4: Security Economics

Security economics is the analysis of aggregate risks facing society and economy using rigorous analytical and empirical tools of economics, which should be regarded in particular with reference to the Lisbon agenda. Policy makers may tend to take imperfect security decisions (e.g. regulations) based on a public perception of (in)security, with an impact to market structures. A singular focus on security or competitiveness would be too narrow;

research under this area will offer key insights that will contribute to balancing security and

–  –  –

the overall policy objectives. Economic theory in particular can offer key insights, enabling governments to optimise their efforts to enhance security and growth.

Topic SEC-2007-6.4-01 Research survey on the emerging field of European security economics research to provide an analytical framework for complementary research Technical content / scope: The task is to study (a) the fields to be covered under “European security economics”, (b) ongoing research activities and open issues as well as (c) the relevant European players active in these fields in order to build up a European capacity for economic analysis and for policy making and with a view to establishing a security economics network.

This might include topics such as indicators for the level of factual security as well as the security related impact of political measures, financial indicators relevant for security, effects of (in)security on individuals, firms and transaction costs between sectors of the economy, approaches to policy evaluation with respect to security issues (e.g. using natural or social experiments to isolate the effects of interventions).

Call: Security Research Call 1 Funding scheme(s): Collaborative project and Coordination and support action (aiming at coordinating and supporting research activities).

Topic SEC-2007-6.4-02 European Security Indicator: methodological research to provide a few select indicators of security and security policy in Europe measuring the effects of both insecurity and security policies on the economy

Technical content / scope:

The task is to develop a set of indicators that together could serve as ‘European Security Indicator’. Both the level of factual security as well as the security related impact of political measures should be addressed, with a view to achieving an objective reference instead of relying on (in)security as perceived by public opinion. This will include an assessment of the economic implications of both insecurity and of the implementation of security policies. It will also assess potential changes in market structures that might be initiated by regulatory measures which aim at stimulating “secure growth” and thus stimulate industries to provide security-enhancing products or services. Eventually it will take into account changes in criminality and assess crime risks.

Call: Security Research Call 1 Funding scheme(s): Collaborative project and Coordination and support action (aiming at supporting research activities).

Topic SEC-2007-6.4-03 Public finance: Studying the scale, function and roles of various types of government security spending across Europe and time.

Technical content / scope: The task is to develop econometric models that together provide an insight into the scale, scope and direction of public investments in security. Such scaleable models, capable of accommodating national as well as European perspectives, should combine the outcomes of various forms of threat and gap analysis to establish the historical effectiveness of public investments in security and provide guidance as to improving both the efficiency and effectiveness of future investments.

Call: Security Research Call 1 Funding scheme(s): Collaborative project and Coordination and support action (aiming at supporting research activities).

–  –  –

Area 6.5: Ethics and justice Security technologies and policies raise various ethical and legal concerns, which influence public support and acceptance.

Research under this area will address the privacy, data protection and human rights issues as well as acceptability and ethical issues and prioritisation questions, while taking into account a variety of approaches to ethical and legal questions based on divergent ethical, religious, historical and philosophical backgrounds. Aspects of social exclusion leading to the formation of areas of insecurity within Europe may also be considered (e.g. suburbs, poverty stricken inner cities) as well as of the European Neighbourhood Policy” that are relevant to security. This will contribute to the general discussion and help both security solution suppliers as well as end users to make better decisions when selecting and applying security technologies and solutions.

Topic SEC-2007-6.5-01 How to take the necessary measures to ensure the security of citizens while respecting the civic rights and how this is implemented in practice, particularly addressing the issue of privacy and security Technical content / scope: The task is to establish a network to analyse the wider context of government security policies and responses to security threats, e.g. in counter-terrorism, in particular from the point of view of personal data protection and integrity of information or of the limits and conditions for any potential loss of privacy or infringement of liberty; in particular also addressing the acceptability of security related technologies.

Call: Security Research Call 1 Funding scheme(s): Collaborative project and Coordination and support action (aiming at supporting research activities).



Pages:     | 1 |   ...   | 4 | 5 || 7 | 8 |   ...   | 9 |


Similar works:

«Gifts Of The Holy Spirit ‘To each one is given the manifestation of the Holy Spirit for good and for profit. To one is given through the Holy Spirit, a word of wisdom and to another a word of knowledge, according to the same Holy Spirit. To another, faith by the same Holy Spirit, to another the gift of healing by the one Holy Spirit. To another the working of miracles, to another prophecy. To another the discernment between true and false spirits, to another various kinds of tongues, to...»

«Plan Document and Summary Plan Description Employer Paid Term Life Insurance January 2016 benefits TO BU I LD ON Employer Paid Term Life Insurance January 2016 MAYO CLINIC EMPLOYER PAID LIFE HOW TO USE THIS DOCUMENT HOW TO USE THIS DOCUMENT The Table of Contents beginning on page 5 provides an overview of the detailed information in the Plan. Also, the glossary beginning on page 22 provides additional detailed definitions. To quickly search for a specific word or phrase simply press your...»

«HSC RESULTS 2007 Emanuel School 14th in the State for English and 28th in the State overall! Two Emanuel students gain a UAI over 99 – mazeltov! 50% of Emanuel students listed on the Merit lists (subject scores of 90 or more) Congratulations to Jonathan Salgo (99.55), Sam Bookatz (99.40), Polina Madorsky (98.60), David Krasovitsky (98.10) – top UAIs Five students were named on the Board of Studies Merit List for attaining All-round Excellence in the Higher School Certificate: Sam Bookatz,...»

«COMMUNITY PET PREPAREDNESS Page Promoting Pet Preparedness in Your Community  Introduction 3  Organization Overview 4 I. BE INFORMED  Review Local Emergency Plans 5-6  Identify Key Organizations and Leaders 6  Research Previous Community Efforts 6-7  Federal, State and Local Resources 8-13 II. PROMOTING PET PREPAREDNESS IN YOUR COMMUNITY  Engaging your Community 14-15  Engaging the Media 16 III. TOOLS  Frequently Asked Questions to provide in e-mails, newsletters,...»

«PDF hosted at the Radboud Repository of the Radboud University Nijmegen The version of the following full text has not yet been defined or was untraceable and may differ from the publisher's version. For additional information about this publication click this link. http://hdl.handle.net/2066/121985 Please be advised that this information was generated on 2016-08-17 and may be subject to change. DOI 10.1515/jhsem-2012-0053   Homeland Security & Emergency Management 2013; 10(1): 113–135...»

«Tips & Tools #7 Content Analysis A Method for Analyzing Qualitative Data This tipsheet provides guidance on using content analysis to analyze qualitative data. Qualitative data are in the form of words, such as the spoken information collected during focus groups or key informant interviews, written responses to open-ended questions in written surveys, or staff reports prepared for city council meetings. (For further discussion about qualitative evaluation methods, see Tips & Tools #5 – Using...»

«OWNER’S GUIDE F50F and F300E Electronic Air Cleaners Place bar code here 69-0756—05 F50F AND F300E ELECTRONIC AIR CLEANERS CONTENTS Operating Your Electronic Air Cleaner Getting the Most from Your Electronic Air Cleaner Maintaining Electronic Prefilter(s), Cell(s) and Postfilter(s) How Electronic Air Cleaning Works Before You Call for Service Honeywell 10-Year UltraClean Coil Guarantee™ Limited Five-year Warranty Product Registration 69-0756—05 2 F50F AND F300E ELECTRONIC AIR CLEANERS...»

«Sally Hicks Strategic Planning and Housing Central Bedfordshire Council Priory House Monks Walk Chicksands Shefford SG17 5TQ BY EMAIL: ldf@centralbedfordshire.gov.uk and post 24 August 2015 OHB010/hpf/hj Dear Ms Hicks, CONSULTATION ON THE COMMUNITY INFRASTRUCTURE LEVY (CIL) DRAFT CHARGING SCHEDULE AND THE PLANNING OBLIGATIONS STRATEGY SPD DRAFT: Response to consultation submitted on behalf of O&H Properties Ltd. I write on behalf of our client O&H Properties Limited (O&H) in response to Central...»

«Heavy quark production in heavy-ion collisions Item type text; Dissertation-Reproduction (electronic) Authors Valerio, Peter Michael, 1968Publisher The University of Arizona. Rights Copyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author. Downloaded...»

«KENIA LA MAYORÍA INVISIBLE: DOS MILLONES DE PERSONAS VIVEN EN ASENTAMIENTOS PRECARIOS EN NAIROBI DERECHOS HUMANOS = MENOS POBREZA Amnistía Internacional es un movimiento mundial, formado por 2,2 millones de personas de más de 150 países y territorios, que hacen campaña para acabar con los abusos graves contra los derechos humanos. Nuestra visión es la de un mundo en el que todas las personas disfrutan de todos los derechos humanos proclamados en la Declaración Universal de Derechos...»

«One of the most controversial selections to have appeared in The Best American Essay series, Shelby Steele's 1988 essay disturbed readers who saw it not as a black writer's candid account of his divided identity but rather as an assimilationist endorsement of white America. In refusing to define himself solely along racial lines, Steele appeared to be turning his back on his own people. His essay, however, calls into question this very dilemma: Steele wonders why black middle-class Americans...»

«Annex to member bulletin 2/2013 Tiihonen, Kärkkäinen 31 October 2013 Collective agreements for blue collar employees, 2013-2016 The Federation of Finnish Technology Industries has renegotiated its collective agreements for blue collar employees, salaried employees and senior salaried employees. This member bulletin explains the key changes made in collective agreements. We shall describe the amendments made to the collective agreements for salaried employees and senior salaried employees in a...»





 
<<  HOME   |    CONTACTS
2016 www.theses.xlibx.info - Theses, dissertations, documentation

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.