FREE ELECTRONIC LIBRARY - Theses, dissertations, documentation

Pages:     | 1 |   ...   | 5 | 6 || 8 | 9 |

«COOPERATION THEME 10 SECURITY (European Commission C(2007)2460 of 11 June 2007) FP 7 Cooperation Work Programme: Security Changes to the Cooperation ...»

-- [ Page 7 ] --

Topic SEC-2007-6.5-02 Ethical implications of the continuum of internal and external security Technical content / scope: The distinction between internal and external security is increasingly blurred. Internal security technologies and polices have a direct effect both on communities within the EU and also on the EU’s neighbouring countries. The task is to examine the effects in terms of scale, scope and depth and to put forward possible remedial solutions as an aid to decision makers.

Call: Security Research Call 1 Funding scheme(s): Collaborative project and Coordination and support action (aiming at supporting research activities).

Page 33 of 53 FP 7 Cooperation Work Programme: Security

Activity 7: Security Research coordination and structuring The Security theme, aiming at contributing to increased security for Europe’s citizens whilst simultaneously improving the global competitiveness of Europe’s industrial base, needs to utilise limited resources in an effective and efficient manner. It is embedded in a fabric of other relevant research work carried out under various other programmes both on the European level as well as in the Member States and Associated Countries. And it can only reach its objective, if its outcome is eventually applied by the relevant end user communities.

This activity provides the platform for actions to coordinate and structure national, European and international security research efforts, to develop synergies between, and avoid duplication with, civil, security and defence research as well as to coordinate between the demand and the supply side of security research. Activities also focus on the improvement of relevant legal conditions and procedures.

It is understood however, that there will be certain areas where coordination and structuring are not sought, or needed, but equally there will be others where coordination and even cooperation would add value.

Expected impact: Actions in this activity will provide deeper insight and wider awareness of the European security related research and industrial landscape and the public environments and frameworks in which stakeholders operate. In particular actions will indicate opportunities and constraints for developing and strengthening a European security related market. Actions will ensure enhanced networking, coordination and co-operation of the Member States and Associated Countries as well as between relevant organisations on the European level. All this which will contribute to the overall impact of the Security theme by making it more effective and efficient, it will raise the innovation level in the security domain and will achieve increasingly harmonised implementation approaches. It will also contribute to the design of future Work Programmes of the Security theme.

The Security Research Call 1 calls for the following actions:

Topic SEC-2007-7.0-01 Technology Watch Technical content / scope: In order to ensure effectiveness and efficiency of the Security theme and the consequent need to be complementary to relevant actions carried out elsewhere, and with a view to ensuring the awareness of underpinning technologies that could be ’spun-in’ to civil security applications, the task is to perform a ‘European Technology Watch’. This should consist of (a) a web based IT system that acts as both a repository for data (technology watch list) and an interface for interrogating the data to user requirements, (b) a network of contact points responsible for managing data entries as well as an independent “neutral” lead coordinator, and (c) a panel to monitor its implementation and advise the EC, Member States and Associated Countries and EU security research community on emerging technologies. The Technology Watch should be based on a joint capability and technology taxonomy, and it needs to take into account and if possible build upon relevant ongoing initiatives.

Call: Security Research Call 1 Funding scheme(s): Coordination and support action (aiming at supporting research activities).

–  –  –

Topic SEC-2007-7.0-02 European Security Research Networks (incl. for standardisation) Technical content / scope: With a view to informing the Security theme as well as security research initiatives in the Member States and Associated Countries, and also to exploit opportunities outside the Community scope, the task is to establish European networks of Member States and Associated Countries, private sector security research requirement owners, operative end-users and technology supply chain experts. This will facilitate a common understanding of needs amongst research requirement owners and end-users, with the support of technology experts, so as to identify technology solutions to meet the needs (on the basis of a joint capability and technology taxonomy), and thus will ensure increased effectiveness and efficiency. Technology oriented research strategies should be complemented by society related research strategies.

Strategic R&T roadmaps should be proposed to guide, orientate and underpin European, national and private research programmes. The networks should furthermore identify possible joint programmes or projects which could be undertaken between services, Member States / Associated Countries and EC or international organisations. Eventually, the networks should address how to cooperate effectively amongst user and supply side stakeholders to deliver security capabilities, how to encourage security innovation, and how to strengthen the technology supply chains from primary research via development to procurement. They should also contribute to the definition of new standards.

Preferably the networks should be based on existing organisations and structures (e.g. the CEN for standardisation). A steering group should ensure coherence between, and across, the different stakeholders and activities. Activities could be structured by mission to achieve homogeneous networks of users and experts. Where appropriate, they should be inter-sectoral but must have a common basis of needs and possible solutions. Within strict conditions of confidentiality, maximum use should be made of secure ICT platforms and networks to exchange relevant data.

The activities of the networks could include an advisory function to the network of Member States’ / Associated Countries’ security research contact points established under topic SECCall: Security Research Call 1 Funding scheme(s): Coordination and support action (aiming at coordinating research activities).

Topic SEC-2007-7.0-03 Network of facilities for testing, evaluating and certifying security related products Technical content / scope: With a view to meeting the objectives of the Security theme, the task is to facilitate the implementation of novel security technologies, products and services (this also includes other types of products and services which should become more ‘crimeproof’). These need to be validated to meet specific standards and to be interoperable with other, including existing, systems. Thus the task is to establish a network of facilities for testing, evaluating and certifying security related products and services to contribute to the further development and improvement of security standards and to quantifiable targets for security levels in security policies. This will help the creation and extension of a European market for security products and services. Activities of the European Committee for Standardization (CEN)18 need to be taken into account.

CEN Technical Board/Working Group 161: Protection and Security of the Citizen

–  –  –

Call: Security Research Call 1 Funding scheme(s): Coordination and support action (aiming at coordinating research activities).

Topic SEC-2007-7.0-04 Transparency and networking amongst Member States and Associated Countries Technical content / scope: With a view to ensuring effectiveness and efficiency of the Security theme and also to exploit opportunities outside the Community scope, the task is to establish a Member States’ and Associated countries’ network of competent and politically relevant national and where appropriate regional contact points that will (a) exchange information on the general situation of security research in their countries and define core areas of common interest to prevent duplication and identify synergies; (b) develop common strategies in the core areas and appropriate transparency mechanisms (referring to a joint capability and technology taxonomy, and considering scope and depth of the transparency as well as agreements on protection of intellectual property and handling of classified information); (c) explore and demonstrate coordinated and/or joint initiatives in these core areas. The action will be similar to the principles of ERA-NET. This topic is open for full scale ERA-NET proposals as well, which should be submitted under this call19.

Call: Security Research Call 1 Funding scheme(s): Coordination and support action.

Topic SEC-2007-7.0-05 Supply chains and market integration

Technical content / scope: With a view to involving the best intellectual and technological capabilities available throughout Europe in the security technology supply chains, including the yet untapped potential, the task is to identify opportunities and weak spots in the supply chains, to identify appropriate organisations (in particular SMEs) not yet involved or settled in the security (research) domain, to help them understand security related targets, mechanisms and opportunities and to facilitate their access to the main stakeholders and integrators of these technology supply chains. The action needs to take into account and if possible build upon relevant ongoing initiatives.

Call: Security Research Call 1 Funding scheme(s): Coordination and support action (aiming at supporting research activities).

Topic SEC-2007-7.0-06 Trans-national co-operation among NCPs

Technical content / scope: The task is to reinforce the network of National Contact Points (NCP) for the 7th Framework Programme under the Security theme, by promoting transnational co-operation. The action will focus on identifying and sharing good practices. This may entail various mechanisms such as benchmarking, joint workshops, training, and twinning schemes. Practical initiatives to benefit cross-border audiences may also be included, such as trans-national brokerage events. The specific approach should be adapted to the nature of the theme, to other relevant ongoing actions and to the capacities and priorities Not the joint call for ERA-NETs across the Themes- See Annex IV

Page 36 of 53 FP 7 Cooperation Work Programme: Security

of the NCPs concerned. Special attention will be given to helping less experienced NCPs rapidly acquire the know-how accumulated in other countries.

Proposals are expected to include all NCPs who have been officially appointed by the relevant national authorities. Other participants from the EU and associated countries are ineligible. If certain NCPs wish to abstain from participating, this fact should be explicitly documented in the proposal. The Commission expects to receive a single proposal under this heading.

Call: Security Research Call 1 Funding scheme(s): Coordination and support action (aiming at coordinating research activities); indicative budget: up to 3 M€. It is expected that the project should last for a maximum of 5 years, and should in any case finish before March 2013.

Expected impact: An improved NCP service across Europe, therefore helping simplify access to calls of the 7th Framework Programme, lowering the entry barriers for newcomers, and raising the average quality of submitted proposals. A more consistent level of NCP support services across Europe. More effective participation of organisation from third countries, alongside European organisations, in line with the principle of mutual benefit.

–  –  –

II.2 Joint Call ICT & Security 1 (FP7-ICT-SEC-2007-1) The activity open in this call corresponds

• For the ICT Theme20, to Objective Critical Infrastructure Protection;

• For the Security Theme, to Activity 5 Improving security systems integration, interconnectivity and interoperability of the Security Research Call 1.

Activity 1: Security systems integration, interconnectivity and interoperability For each of the four mission areas, integration, connectivity and interoperability play a very specific enabling role - both within and amongst missions. The purpose of this section is to draw attention to, and in some instances expand upon, those common issues of importance mentioned within the mission areas. Activities will enable and/or contribute to the performance of technology required for building up the necessary capabilities, thus focusing on cross-cutting issues such as: enhancing the interoperability and intercommunication of systems, equipment, services and processes while ensuring their reliability, protection of confidentiality and integrity of information, traceability of all transactions and their processing etc. Activities will also address standardisation and training matters (including such with respect to cultural, human and organisational interoperability).

To reach these objectives, a joint call with the ICT Theme is organised as follows:

Joint Call between the ICT Theme and the Security Theme on Critical Infrastructure Protection The interoperability and interconnectivity of supply systems is one of the cornerstones of the functioning of our societies. The vulnerabilities in the intercommunication of systems, equipment, services and processes and their resilience against malicious attacks of terrorism and (organised) crime are elementary to the security of the citizens.

The objective of the joint call is to make key infrastructures of modern life, such as energy production sites and transmission systems, storage and distribution, information and communication networks, sensitive manufacturing plants, banking and finance, healthcare, or transportation systems more secure and dependable. The aim is to protect such critical infrastructures that can be damaged, destroyed or disrupted by deliberate acts of terrorism, natural disasters, negligence, mismanagements, accidents, computer hacking, criminal activity and malicious behaviour and to safeguard them against incidents, malfunctions and failures.

The joint call is structured around two specific foci.

Pages:     | 1 |   ...   | 5 | 6 || 8 | 9 |

Similar works:

«Yankee Beemers Motorcycle Club News April Airhead Edition Jess and Tobi Touring the Southland 2015 Yankee Beemers M.C. Officers Executive B oarrd kz1000@gmail.com President: Ken Springhetti Director: Dwight Nevins Vice President: John VanHook jvanhook@comcast.net Director: Marc Waegemann Secretary: Marc Waegeman waegemann@gmail.com Director: Gary Nelson jamessanders27@comcast.net Director: John Shields Treasurer: Jim Sanders ybshorts@gmail.com Editor: Dwight Nevins Director: Ken Springhetti...»

«Risø-R-1565(EN) Analyses of Demand Response in Denmark Frits Møller Andersen Stine Grenaa Jensen Helge V. Larsen Peter Meibom Hans Ravn Klaus Skytte Mikael Togeby Risø National Laboratory Ea Energy Analyses RAM-løse edb Denmark October 2006 Authors: Frits Møller Andersen, Stine Grenaa Jensen, Helge V. Larsen, Peter Risø-R-1565(EN) Meibom, Hans Ravn, Klaus Skytte, Mikael Togeby October 2006 Title: Analyses of Demand Response in Denmark Department: Systems Analysis Department ISSN 0106-2840...»

«Amicus Attorney Link Guide: CompuLaw Applies to: • Amicus Attorney Small Firm Edition 2011 The Amicus Attorney-CompuLaw Link lets you create and modify CompuLaw® Court Rulesbased Events directly from your Amicus Attorney Files and Calendar. Creating a CompuLaw Event requires a different procedure from the regular way of creating Amicus Attorney Appointments and To Do’s. CompuLaw Events are created and modified using menu commands in the Amicus Attorney Calendar and Files modules. These...»

«catamaranes ocasión catamaranes ocasión Grupo Catamaranes.com. Venta de Barcos Catamaranes.com le ofrece catamaranes o yates de ocasion en venta. MANTENIMIENTO DE BARCOS tc.share MANTENIMIENTO DE BARCOS tc.share-with.net barcos.com Barcos y Yates de ocasión, directorio de barcos y náutica. barcos.com. Catamaranes a Vela Nuevos (3) Neumáticas Nuevas (211) Yates a Motor Nuevos (2) Jaguar Catamarans | Catamaran For Sale, Bateaux doccasion; Nouvelles et événements; Services. Vendez votre...»

«PERU: Reparations begin but IDPs excluded A profile of the internal displacement situation 8 January, 2009 This Internal Displacement Profile is automatically generated from the online IDP database of the Internal Displacement Monitoring Centre (IDMC). It includes an overview of the internal displacement situation in the country prepared by the IDMC, followed by a compilation of excerpts from relevant reports by a variety of different sources. All headlines as well as the bullet point summaries...»

«OBRA DIGITAL ISSN 503. Vol 4, Núm 1 – Febrero 2013 Investigating the domestication of convergent mobile media and mobile internet by children and teens: preliminary issues and empirical findings on opportunities and risks. Investigación de la domesticación de la convergencia de los medios móviles e internet móvil por parte de niños y adolescentes: cuestiones previas y hallazgos empíricos sobre las oportunidades y riesgos. Barbara Scifo PhD, is a Senior Lecturer in Sociology of Culture...»

«November 8, 2011 Research Update: Steel Group ArcelorMittal Outlook Revised To Negative On Weak Credit Metrics; 'BBB-/A-3' Ratings Affirmed Primary Credit Analyst: Andrey Nikolaev, Paris (33) 1-4420-7329;andrey_nikolaev@standardandpoors.com Secondary Contact: Elad Jelasko, London 00-44-207-176-7013;elad_jelasko@standardandpoors.com Table Of Contents Overview Rating Action Rationale Outlook Related Criteria And Research Ratings List www.standardandpoors.com/ratingsdirect 910207 | 300989091...»

«CONVECTION OVEN CO900B For your safety and continued enjoyment of this product, always read the instruction book carefully before using. IMPORTANT SAFEGUARDS When using electrical appliances, basic safety precautions should always be followed to reduce the risk of fire, electric shock and/or injury to persons, including the following: READ ALL INSTRUCTIONS 1. To protect against risk of electrical shock, do not put appliance in water or other liquid. . When using the handle or a knob during the...»

«drag racing cars nostalgia for sale on drag racing cars nostalgia for sale on Drag Racing Cars, Nostalgia for sale on 151 street and racing Drag Racing Cars, Nostalgia for sale today on RacingJunk Classifieds nostalgia drag car | eBay Electronics, Cars, Model Drag Cars; Refine. Eric Larson "The Boss Bird" Firebird Funny Car Nostalgia Drag Racing We base this on the sales prices of the same items Vintage Drag Racing Goodguys Contact Sales; Info. About Goodguys; Nostalgia Nitro Funny...»

«Periods / Week = 04 Total No. of Periods Reqd. = 45 Assignment + Mid Sem = 15+25 = 40 End Sem Exam Marks = 60 Total Marks = 100 Duration of End Sem Exam = 2.5 Hrs WEN-102: ENGLISH & COMMUNICATION SKILLS-I I Unseen passage: Reading and comprehending un-simplified text and guessing the meaning of unfamiliar words from the context. Note: (i) The passage could be used for testing, note making and testing vocabulary. (ii) Identifying the main/ central points and supporting details. II Text book...»

«Willaqniykuna Boletín de la Asociación de Estudios Bolivianos (AEB) Nº 8, agosto 2010 Sucre-Bolivia Willaqniykuna Nº 8 Boletín de la Asociación de Estudios Bolivianos Responsables y coordinación de la edición Laurent Lacroix (laurentlacroixdefaye@yahoo.fr) y Paola Revilla Orías (paorevi@gmail.com) Colaboradores Ana María Lema Garrett Marcela Inch Calvimonte Andrés Orías Bleichner Máximo Pacheco Balanza Rosario Barahona Michel Jorge Luis Castro Imagen de la tapa Carnaval en la...»

«The Art of the Straight Razor Shave A Basic Guide by Christopher Moss Copyright © 2005 Christopher Moss. A! rights reserved. Table of Contents Chapter 1: Why Bother? Chapter 2: The Razor Chapter 3: Honing, Stropping and Care of your razor Chapter 4: The Preparation Chapter 5: The Badger Brush, Hard Soaps and Creams Chapter 6: The Shave Chapter 7: Aftermath Appendix: Useful web links Disclaimer Used sensibly and carefully, a straight razor is an excellent means of shaving. Without due care and...»

<<  HOME   |    CONTACTS
2016 www.theses.xlibx.info - Theses, dissertations, documentation

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.