FREE ELECTRONIC LIBRARY - Theses, dissertations, documentation

Pages:     | 1 |   ...   | 5 | 6 || 8 | 9 |

«COOPERATION THEME 10 SECURITY (European Commission C(2007)5765 of 29 November 2007) FP 7 Cooperation Work Programme: Security This Work Programme ...»

-- [ Page 7 ] --

Research under this area will address the privacy, data protection and human rights issues as well as acceptability and ethical issues and prioritisation questions, while taking into account a variety of approaches to ethical and legal questions based on divergent ethical, religious, historical and philosophical backgrounds. Aspects of social exclusion leading to the formation of areas of insecurity within Europe may also be considered (e.g. suburbs, poverty stricken inner cities) as well as of the European Neighbourhood Policy” that are relevant to security. This will contribute to the general discussion and help both security solution suppliers as well as end users to make better decisions when selecting and applying security technologies and solutions.

Topic SEC-2007-6.5-01 How to take the necessary measures to ensure the security of citizens while respecting the civic rights and how this is implemented in practice, particularly addressing the issue of privacy and security Technical content / scope: The task is to establish a network to analyse the wider context of government security policies and responses to security threats, e.g. in counter-terrorism, in particular from the point of view of personal data protection and integrity of information or of the limits and conditions for any potential loss of privacy or infringement of liberty; in particular also addressing the acceptability of security related technologies.

Call: Security Research Call 1 Funding scheme(s): Collaborative project and Coordination and support action (aiming at supporting research activities).

Topic SEC-2007-6.5-02 Ethical implications of the continuum of internal and external security Technical content / scope: The distinction between internal and external security is increasingly blurred. Internal security technologies and polices have a direct effect both on communities within the EU and also on the EU’s neighbouring countries. The task is to examine the effects in terms of scale, scope and depth and to put forward possible remedial solutions as an aid to decision makers.

Call: Security Research Call 1 Funding scheme(s): Collaborative project and Coordination and support action (aiming at supporting research activities).

Page 35 of 57 FP 7 Cooperation Work Programme: Security

Activity 7: Security Research coordination and structuring The Security theme, aiming at contributing to increased security for Europe’s citizens whilst simultaneously improving the global competitiveness of Europe’s industrial base, needs to utilise limited resources in an effective and efficient manner. It is embedded in a fabric of other relevant research work carried out under various other programmes both on the European level as well as in the Member States and Associated Countries. And it can only reach its objective, if its outcome is eventually applied by the relevant end user communities.

This activity provides the platform for actions to coordinate and structure national, European and international security research efforts, to develop synergies between, and avoid duplication with, civil, security and defence research as well as to coordinate between the demand and the supply side of security research. Activities also focus on the improvement of relevant legal conditions and procedures.

It is understood however, that there will be certain areas where coordination and structuring are not sought, or needed, but equally there will be others where coordination and even cooperation would add value.

Expected impact: Actions in this activity will provide deeper insight and wider awareness of the European security related research and industrial landscape and the public environments and frameworks in which stakeholders operate. In particular actions will indicate opportunities and constraints for developing and strengthening a European security related market. Actions will ensure enhanced networking, coordination and co-operation of the Member States and Associated Countries as well as between relevant organisations on the European level. All this which will contribute to the overall impact of the Security theme by making it more effective and efficient, it will raise the innovation level in the security domain and will achieve increasingly harmonised implementation approaches. It will also contribute to the design of future Work Programmes of the Security theme.

The Security Research Call 1 calls for the following actions:

Topic SEC-2007-7.0-01 Technology Watch Technical content / scope: In order to ensure effectiveness and efficiency of the Security theme and the consequent need to be complementary to relevant actions carried out elsewhere, and with a view to ensuring the awareness of underpinning technologies that could be ’spun-in’ to civil security applications, the task is to perform a ‘European Technology Watch’. This should consist of (a) a web based IT system that acts as both a repository for data (technology watch list) and an interface for interrogating the data to user requirements, (b) a network of contact points responsible for managing data entries as well as an independent “neutral” lead coordinator, and (c) a panel to monitor its implementation and advise the EC, Member States and Associated Countries and EU security research community on emerging technologies. The Technology Watch should be based on a joint capability and technology taxonomy, and it needs to take into account and if possible build upon relevant ongoing initiatives.

Call: Security Research Call 1 Funding scheme(s): Coordination and support action (aiming at supporting research activities).

–  –  –

Topic SEC-2007-7.0-02 European Security Research Networks (incl. for standardisation) Technical content / scope: With a view to informing the Security theme as well as security research initiatives in the Member States and Associated Countries, and also to exploit opportunities outside the Community scope, the task is to establish European networks of Member States and Associated Countries, private sector security research requirement owners, operative end-users and technology supply chain experts. This will facilitate a common understanding of needs amongst research requirement owners and end-users, with the support of technology experts, so as to identify technology solutions to meet the needs (on the basis of a joint capability and technology taxonomy), and thus will ensure increased effectiveness and efficiency. Technology oriented research strategies should be complemented by society related research strategies.

Strategic R&T roadmaps should be proposed to guide, orientate and underpin European, national and private research programmes. The networks should furthermore identify possible joint programmes or projects which could be undertaken between services, Member States / Associated Countries and EC or international organisations. Eventually, the networks should address how to cooperate effectively amongst user and supply side stakeholders to deliver security capabilities, how to encourage security innovation, and how to strengthen the technology supply chains from primary research via development to procurement. They should also contribute to the definition of new standards.

Preferably the networks should be based on existing organisations and structures (e.g. the CEN for standardisation). A steering group should ensure coherence between, and across, the different stakeholders and activities. Activities could be structured by mission to achieve homogeneous networks of users and experts. Where appropriate, they should be inter-sectoral but must have a common basis of needs and possible solutions. Within strict conditions of confidentiality, maximum use should be made of secure ICT platforms and networks to exchange relevant data.

The activities of the networks could include an advisory function to the network of Member States’ / Associated Countries’ security research contact points established under topic SECCall: Security Research Call 1 Funding scheme(s): Coordination and support action (aiming at coordinating research activities).

Topic SEC-2007-7.0-03 Network of facilities for testing, evaluating and certifying security related products Technical content / scope: With a view to meeting the objectives of the Security theme, the task is to facilitate the implementation of novel security technologies, products and services (this also includes other types of products and services which should become more ‘crimeproof’). These need to be validated to meet specific standards and to be interoperable with other, including existing, systems. Thus the task is to establish a network of facilities for testing, evaluating and certifying security related products and services to contribute to the further development and improvement of security standards and to quantifiable targets for security levels in security policies. This will help the creation and extension of a European market for security products and services. Activities of the European Committee for Standardization (CEN)18 need to be taken into account.

CEN Technical Board/Working Group 161: Protection and Security of the Citizen

–  –  –

Call: Security Research Call 1 Funding scheme(s): Coordination and support action (aiming at coordinating research activities).

Topic SEC-2007-7.0-04 Transparency and networking amongst Member States and Associated Countries Technical content / scope: With a view to ensuring effectiveness and efficiency of the Security theme and also to exploit opportunities outside the Community scope, the task is to establish a Member States’ and Associated countries’ network of competent and politically relevant national and where appropriate regional contact points that will (a) exchange information on the general situation of security research in their countries and define core areas of common interest to prevent duplication and identify synergies; (b) develop common strategies in the core areas and appropriate transparency mechanisms (referring to a joint capability and technology taxonomy, and considering scope and depth of the transparency as well as agreements on protection of intellectual property and handling of classified information); (c) explore and demonstrate coordinated and/or joint initiatives in these core areas. The action will be similar to the principles of ERA-NET. This topic is open for full scale ERA-NET proposals as well, which should be submitted under this call19.

Call: Security Research Call 1 Funding scheme(s): Coordination and support action.

Topic SEC-2007-7.0-05 Supply chains and market integration

Technical content / scope: With a view to involving the best intellectual and technological capabilities available throughout Europe in the security technology supply chains, including the yet untapped potential, the task is to identify opportunities and weak spots in the supply chains, to identify appropriate organisations (in particular SMEs) not yet involved or settled in the security (research) domain, to help them understand security related targets, mechanisms and opportunities and to facilitate their access to the main stakeholders and integrators of these technology supply chains. The action needs to take into account and if possible build upon relevant ongoing initiatives.

Call: Security Research Call 1 Funding scheme(s): Coordination and support action (aiming at supporting research activities).

Topic SEC-2007-7.0-06 Trans-national co-operation among NCPs

Technical content / scope: The task is to reinforce the network of National Contact Points (NCP) for the 7th Framework Programme under the Security theme, by promoting transnational co-operation. The action will focus on identifying and sharing good practices. This may entail various mechanisms such as benchmarking, joint workshops, training, and twinning schemes. Practical initiatives to benefit cross-border audiences may also be included, such as trans-national brokerage events. The specific approach should be adapted to the nature of the theme, to other relevant ongoing actions and to the capacities and priorities Not the joint call for ERA-NETs across the Themes- See Annex IV

Page 38 of 57 FP 7 Cooperation Work Programme: Security

of the NCPs concerned. Special attention will be given to helping less experienced NCPs rapidly acquire the know-how accumulated in other countries.

Proposals are expected to include all NCPs who have been officially appointed by the relevant national authorities. Other participants from the EU and associated countries are ineligible. If certain NCPs wish to abstain from participating, this fact should be explicitly documented in the proposal. The Commission expects to receive a single proposal under this heading.

Call: Security Research Call 1 Funding scheme(s): Coordination and support action (aiming at coordinating research activities); indicative budget: up to EUR 3 million. It is expected that the project should last for a maximum of 5 years, and should in any case finish before March 2013.

Expected impact: An improved NCP service across Europe, therefore helping simplify access to calls of the 7th Framework Programme, lowering the entry barriers for newcomers, and raising the average quality of submitted proposals. A more consistent level of NCP support services across Europe. More effective participation of organisation from third countries, alongside European organisations, in line with the principle of mutual benefit.

–  –  –

II.2 Joint Call ICT & Security 1 (FP7-ICT-SEC-2007-1) The activity open in this call corresponds

• For the ICT Theme20, to Objective Critical Infrastructure Protection;

• For the Security Theme, to Activity 5 Improving security systems integration, interconnectivity and interoperability of the Security Research Call 1.

Pages:     | 1 |   ...   | 5 | 6 || 8 | 9 |

Similar works:

«Nouveautés de Mastercam X8 Août 2014 Nouveautés de Mastercam® X8 Date: Août 2014 Copyright © 2014 CNC Software, Inc.— Tous droits réservés. Logiciel: Mastercam X8 L’utilisation de ce document est liée à l’acceptation du Contrat de Licence TERMES Utilisateur Final Mastercam. Une copie de ce Contrat de Licence d’Utilisateur Final UTILISATION Mastercam est fournie avec le package du produit Mastercam dont ce document fait partie. Le Contrat de Licence d’Utilisateur Final...»

«27/4/2012 10:26:51 Fecha Página 1 de 27 INCUAL-Intranet Informe CUALIFICACIÓN ORGANIZACIÓN DEL TRANSPORTE Y LA DISTRIBUCIÓN PROFESIONAL Familia Profesional Comercio y Marketing Nivel 3 Código COM317_3 Versión 5 Situación RD 109/2008 Actualización Competencia general Organizar y controlar las operaciones de transporte de mercancías para optimizar el proceso logístico de acuerdo con las especificaciones establecidas, plazo y mínimo coste, garantizando la integridad y seguimiento de las...»

«Documento de Trabalho 372 Entendendo a eficácia do financiamento climático: o Fundo Amazônia Maya Forstater, Smita Nakhooda e Charlene Watson Abril de 2013 ODI 203 Blackfriars Road, Londres SE1 8NJ www.odi.org.uk * Aviso: As opiniões apresentadas neste artigo são de responsabilidade das autoras e não representam necessariamente as opiniões do Overseas Development Institute (ODI) e do Department for International Development (DFID) do Reino Unido. ii Conteúdo Conteúdo ii Resumo Error!...»

«CURRICULUM VITAE Kevin Fox Gotham, Ph.D. November 11, 2015 CONTACT INFORMATION Associate Dean of Research, Graduate Programs, and Grants School of Liberal Arts (SLA) Tulane University 102 Newcomb Hall New Orleans, LA 70118 Phone: (504) 862-3004 Fax: (504) 865-5224 Email: kgotham@tulane.edu Professor of Sociology Tulane University 220 Newcomb Hall New Orleans, LA 70118 Fax: (504) 865-5544 Personal Website: http://tulane.edu/liberal-arts/kevin-gotham.cfm EDUCATIONAL RECORD Ph.D., Sociology,...»

«THE PEOPLE OF CALVARY BAPTIST CHURCH GATHER THE WORSHIP GOD OF APRIL 24, 2016 FIFTH SUNDAY OF EASTER 11:00 A.M. We are an ecumenical, multi-racial, multi-ethnic Christian body that reaches out to the world with the Good News of Jesus Christ. To that end we strive to be welcoming, responsive, trusting and prayerful in everything we do. _ GATHERING FOR WORSHIP PRELUDE Just As I Am To reflect upon the words, see hymn 339. WOODWORTH/arr. Clarence Kohlmann Cheryl Branham, Piano WELCOME Reverend Lea...»

«Journal of Intercultural Management Volume 7 Number 1, January 2015 Editor-in-chiEf: Łukasz Sułkowski AssociAtE Editor: Michał Chmielecki tExt dEsign And typEsEtting: Agnieszka Zytka covEr dEsign: Marcin Szadkowski EditoriAl officE: Społeczna Akademia Nauk ul. Sienkiewicza 9, 90–113 Łódź tel./fax: (42) 664 66 21 e-mail: wydawnictwo@spoleczna.pl printing And binding: Mazowieckie Centrum Poligrafii biuro@c-p.com.pl mobile: 509 137 077 ISSN 2080-0150 All the articles published in the...»

«PORTA LINGUARUM 15, enero 2011 pp. 151-159 The Use of Different Spelling Strategies among EFL Young Learners SASAN BALEGHIZADEH AND ZEINAB DARGAHI Shahid Beheshti University, G.C., Evin, Tehran, Iran Received: 12 February 2010 / Accepted: 23 September 2010 ISSN: 1697-7467 ABSTRACT: The present study aimed to investigate the frequency of children’s spelling strategy use in the primary levels of learning English. It also compared the use of these strategies in good and average spellers with...»

«Larhyss Journal, ISSN 1112-3680, n°16, Décembre 2013, pp. 21-30 © 2013 Tous droits réservés APPLICATION OF THE DRASTIC GROUNDWATER VULNERABILITY MAPPING TO THE AQUIFER OF MAGHNIA (NORTH-WEST OF ALGERIA) ADJIM M.1, 3, BENSAOULA F. 1,2 Département d’Hydraulique, Faculté de Technologie, Université de Tlemcen, Algérie. Laboratoire 25 de l’université de Tlemcen: Promotion des Ressources Hydriques, Pédologiques et minière. Laboratoire 60 de l’université de Tlemcen : valorisation...»

«Lexicon PCM80/81 Italo De Angelis Presets Library Part 1 2011© FX SOUNDWORKS venerdì 7 ottobre 2011 This collection of 40 presets is a powerful representation of the truly wonderful sonic capabilities of the Lexicon PCM80/81 units. I have explored all the basic algorithms, to provide great sounding FX solutions to the professional guitarist and to the fan who both love sounds and have a burning desire for top notch gear to work at its best. You will find exceptional reverbs here, from large...»

«Subasta 142 – 16 octubre 2014 – 18:00h 1 Facsímil-Libro de Horas-Carlos V. Libro de Horas de Carlos V. Madrid, Casariego, 1994. 2 vols. en 8º. El primero con el facsímil del códice original a todo color. Tela editorial. El segundo 141 p, 1 h. con estudios. Cartoné editorial; estuche para ambos. Edición numerada de 995 ejemplares. Con 79 miniaturas, 346 capitulares y numerosas orlas decorativas. Libro de horas encargado a Carlos V, con motivo de su proclamación como rey en 1516....»

«ADDENDUM ACKNOWLEDGMENT FORM ITN # 11/12-21 ADDENDUM #1 Department of Revenue Building 2 Suite 1600 2450 Shumard Oak Blvd, Tallahassee, Florida 32399-0109 ITN No.: 11/12-21 ITN TITLE: e-Services System and Related Services and Commodities OPENING DATE: May 31, 2013 ADDENDUM NO.: 1 DATE: April 24, 2013 PLEASE BE ADVISED THAT THE FOLLOWING CHANGES ARE APPLICABLE TO THE ORIGINAL SPECIFICATIONS OF THE ABOVE-REFERENCED ITN: Page 8 of the ITN has been revised and replaced. Please insert the attached...»

«Information Pack for British Prisoners in Costa Rica Author British Embassy Costa Rica Date 14 July 2014 UNCLASSIFIED Contents Introduction Who can help? About the Embassy Who are the Consular Representatives? Contact Information First Steps Who will know I have been detained? What will my family be told? What will the Consulate do? Would I have a criminal record in the UK? Visits How do my family and friends arrange a visit? How many visits am I allowed? Other Types of Visitor Consular visits...»

<<  HOME   |    CONTACTS
2016 www.theses.xlibx.info - Theses, dissertations, documentation

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.