Info day. FP7-SEC call. 27 June 2012 Rome. Angelo MARINO. Deputy Head of Unit Security Research

Similar documents
FP7 Security Research: rules, specificities and projects typology

FP7 Cooperation Programme - Theme 6 Environment (including climate change) Tentative Work Programme 2011

H2020 Thematic Oriented Training "Secure Societies Calls"

HORIZON 2020 PROGRAMME

FP7-INFRASTRUCTURES

The main FP7 instruments. Aurélien Saffroy. 6 Dec

FP7 Funding Opportunities for the ICT Industry

General Information on Secure Societies SC7 Calls 2018

Ex-post Evaluation of the Preparatory Action on Security Research (PASR) Interim Evaluation of FP7 Security Research.

FET Flagships in Horizon 2020

R&D funding for SMEs in the 7th Framework Programme

Access to Research Infrastructures under Horizon 2020 and beyond

Horizon 2020 and Photonics

Working with SMEs on projects

Examples of Public Procurement of R&D services within EU funded Security Research actions

Webinar SEREN3 and Net4Society 14 th of February Fare clic per modificare lo stile del titolo

FET Open in Horizon Roumen Borissov Scientific/Technical Project Officer Future and Emerging Technologies, DG CONNECT European Commission

FP7 ICT Work Programme

Rethinking the role of Social Sciences and Humanities (SSH) in Horizon 2020: toward a reflective and generative perspective

An Introdcution to Horizon 2020

demonstrator approach real market conditions would be useful to provide a unified partner search instrument for the CIP programme

Citizens' Observatories & Crowdsourcing Novel ways to engage citizens in science and environmental policy-making

Please send your responses by to: This consultation closes on Friday, 8 April 2016.

Transforming Consumer and Health-Oriented Society through Science and Innovation. SBRA meeting 20 June 2018

DG GROW - Internal Market, Industry Entrepreneurship and SMEs GROW/I1 - Space Policy and Research Unit

PPP InfoDay Brussels, July 2012

Pre-Operational Validation (POV) Examples of Public Procurement of R&D services within EU funded Security Research actions. Paolo Salieri 1/2/2017

Scoping Paper for. Horizon 2020 work programme Leadership in Enabling and Industrial Technologies Space

Low Carbon Vehicles Innovation Platform

Fact Sheet IP specificities in research for the benefit of SMEs

Introducing the 7 th Community Framework Programme for Research and Technological Development ( ) 2013)

Terms of Reference. Call for Experts in the field of Foresight and ICT

Il programma di lavoro SSH 2013

Pre-Commercial Procurement (PCP) Actions

H2020 Theme Oriented Training on ICT. H2020 Overview. Thies Wittig. Deputy Team Leader Project "Turkey in Horizon 2020"

Scoping Paper for. Horizon 2020 work programme Societal Challenge 4: Smart, Green and Integrated Transport

WG/STAIR. Knut Blind, STAIR Chairman

VSNU December Broadening EU s horizons. Position paper FP9

H2020 Focused Group Training "Legal and Financial Issues"

EUROPEAN GNSS APPLICATIONS IN H2020

Secure Societies. Pauli Stigell, Pekka Rantala

H2020 Thematic Oriented Training "Secure, Clean and Efficient Energy"

An introduction to the 7 th Framework Programme for Research and Technological Development. Gorgias Garofalakis

H2020 Thematic Oriented Training " Food and Biotechnology "

IoT governance roadmap

FP9 s ambitious aims for societal impact call for a step change in interdisciplinarity and citizen engagement.

Horizon 2020 The EU s new framework programme for research and innovation ( )

Research Infrastructures in FP6 WORKING DOCUMENT

Working together to deliver on Europe 2020

Advanced Impacts evaluation Methodology for innovative freight transport Solutions

H2020 Theme Oriented Training NMBP

Position Paper of Iberian Universities Design of FP9

Horizon 2020 Towards a Common Strategic Framework for EU Research and Innovation Funding

PREPARATORY ACTION ON DEFENCE RESEARCH

Raw materials topics in Horizon 2020 Societal Challenge 5 Work Programme 2016

European Robotics Research: Achievements and challenges

Miriam de Angelis H2020 National Contact Point for Smart green and integrated transport & Climate action, environment, resource efficiency and raw

Cooperative Research through EDA

Socio-Economic Sciences and Humanities. First Call for proposals. Nikos Kastrinos. Unit L1 Coordination and Horizontal Aspects

The 45 Adopted Recommendations under the WIPO Development Agenda

European GNSS Applications in H2020

How to write a Successful Proposal

The European Union Research Framework Programme opportunities for cooperation with third countries

Conclusions on the future of information and communication technologies research, innovation and infrastructures

Brief presentation of the results Ioana ISPAS ERA NET COFUND Expert Group

Robotics: from FP7 to Horizon Libor Král, Head of Unit Unit A2 - Robotics DG Communication Networks, Content and Technology European Commission

Developing Smart Specialisation through Targeted Support

Roadmap Pitch: Road2CPS - Roadmapping Project Platforms4CPS Roadmap Workshop

WIPO Development Agenda

The Space Call for H2020

COST FP9 Position Paper

8365/18 CF/nj 1 DG G 3 C

Wind Energy Technology Roadmap

TOLAE related calls in Horizon 2020 LEIT ICT WP

National approach to artificial intelligence

OSRA Overarching Strategic Research Agenda and CapTech SRAs Harmonisation. Connecting R&T and Capability Development

Opportunities for Science & Technology Cooperation between the European Union and Russia

EC proposal for the next MFF/smart specialisation

COMMISSION RECOMMENDATION. of on access to and preservation of scientific information. {SWD(2012) 221 final} {SWD(2012) 222 final}

FP Work Programmes International Dimension. Opportunities for Latin American and Caribbean (LAC) Countries

D.2.2 Concept and methodology for ICT Fora

ROBOTICS in H ICT

Common evaluation criteria for evaluating proposals

At its meeting on 18 May 2016, the Permanent Representatives Committee noted the unanimous agreement on the above conclusions.

Framework Programme 7

Meeting Report (Prepared by Angel Aparicio, Transport Advisory Group Rapporteur) 21 June Introduction... 1

STRUCTURE OF THE H2020 PROPOSAL, TYPES OF ACTIONS, TLR. Summer School for Young Researchers, September 2017, Odessa

Introducing the Work Programme of Horizon EU R&I Day Seoul, 24 November 2017

Horizon Societal Challenge 1: Health, demographic change and wellbeing. Jeremy Bray DG Research & Innovation European Commission

ARTEMIS Industry Association

Production research at European level supports regions and SMEs

Towards EU-US Collaboration on the Internet of Things (IoT) & Cyber-physical Systems (CPS)

UN-GGIM Future Trends in Geospatial Information Management 1

Opportunities for participation for international partners in Horizon Name: Function:

Mainstreaming PE in Horizon 2020: perspectives and ambitions

4th BioHorizon International Brokerage Event 26 th of June Fare clic per modificare lo stile del titolo

EeB-CA² Training: Innovation Management. Agenda. 15th June, 2016, Brussels, Belgium

HORIZON Leadership in Enabling and Industrial Technologies (LEIT)

FCH2 JU under Horizon 2020 rules - Rules for Participation - Ethics - IPR

July REFLECTIONS ON FP8 (non - paper)

Transcription:

Info day FP7-SEC-2013-1 call 27 June 2012 Rome Angelo MARINO Deputy Head of Unit Security Research

FP7 Security Theme Work Programme 2013 Time frame and budget Evaluation Process Call specific issues Funding schemes Topics WP & SME s Recommendations

FP7 Security Theme FP7 2007-2013: Total 50,521 M FP7 Cooperation Programme: 32,413 M The 10 Themes Space 1,430 4% Socio-economics 623 2% Security 1,400 4% Health 6,100 19% Transport 4,160 13% Food, 1,935 6% Environment 1,890 6% Energy 2,350 7% NMT 3,475 11% ICT 28% 9,050

Challenge for R&D in support to policy Today: 5-6 yrs from definition of R&D topics to project completion. Need to minimize this interval and synchronize with interval of policy making and implementation! Projects should quickly (and authoritatively) feed the results of R&D to policy setting: a factor of merit to be assessed under Impact

Theme 10 Security Objectives To develop the technologies and knowledge for building capabilities needed to ensure the security of citizens from threats such as acts of terrorist acts and (organised) crime, natural disasters and industrial accidents while respecting fundamental human rights including privacy; To ensure optimal and concerted use of available and evolving technologies to the benefit of civil European security; To stimulate the cooperation of providers and users for civil security solutions; To improve the competitiveness of the European security industry and To deliver mission-oriented results to reduce security gaps.

Activities of the Security theme Security missions / activities 1.Security of citizens 2.Security of infrastructure and utilities 3.Intelligent surveillance and border security 4.Restoring security and safety in case of crisi Cross cutting activities 5.Security systems integration, interconnectivity and interoperability 6.Security and Society 7.Security Research coordination and structuring

Research routes to meet the Security theme objectives Systems of systems demonstration - Combination of IP results - Multi-mission System development and validation - Combination of capabilities - Mission specific Capability development - Technology development - Multi mission and mission specific

Work Programme 2012 I- Introductory part: policy context and approach II- Content of the Security Call 6 - More topics: 54 - More funding: ~299 MEUR - All activities opened - 2 POVs (pre-operational-validation) - 2 SMEs open topic (bottom-up approach) III- Implementation of the Security Call 6 IV- Other actions V- Budget

Tentative Timeframe Call publication: 10 July 2012 REA Info-day (Brussels): 11 September 2012 Deadline for submissions: 22 Nov 2012 at 17:00.00 Brussels time Proposals evaluation: - Remote: mid Dec 2012 / end Jan 2013 - In house: end Jan 2013 / mid Feb 2013 - Panel meeting: mid Feb 2013 - Ethics screening: Mar 2013 / mid Apr 2013 - Security Scrutiny: end Feb 2013 / mid May 2013 Indicative start of negotiations of short listed proposals: mid-2013 Indicative projects starting date: end 2013 / beginning 2014

and Budget Indicative Call budget: 299.3 M * Integration & Demonstration projects: ~45% (35-65%) POV (topics 3.2-1, 5.3-2): ~ 6% (0-10%) Other topics: ~49% (39-69%) SMEs open topics 7.2-1, 7.6-1: up to ~5% International cooperation: up to ~1% * The total budget for this call is subject to the approval of the EU budget authority

Who can participate? Any undertaking, university, research centre or other existing legal entity established in: EU Member States (MS) Associated Countries to FP7 (AC) = Iceland, Liechtenstein, Norway, Croatia, Serbia, Turkey, FYROM, Switzerland, Israel, Albania, Montenegro, Bosnia & Herzegovina, Faroe Islands, Moldova check list on Cordis) ftp://ftp.cordis.europa.eu/pub/fp7/docs/third-country-agreements_en.doc If the conditions for participation are met: Minimum number: at least 3 independent participants from 3 MS/AC (Joint Research Centre (JRC) as if established in another MS/AC) WP 2013 Topic 3.2-1 and 5.3-2 of POV: at least 3 independent public authorities (local, regional, national, supra-national) from 3 different MS/AC Except for Support Action: 1 legal entity NB: Always check the WP/FP and the call for proposal International organisations and participants from third countries can participate only in addition to the above set minima

Eligibility for funding Legal entities from MS and AC or created under EU law (and JRC) International organisations of European interest Legal entities established in International Cooperation Partner Countries (ICPC see list on Annex I to the WP) ftp://ftp.cordis.europa.eu/pub/fp7/docs/wp/cooperation/cooperation-generalannexes201101_en.pdf International organisations and legal entities from third countries other than AC or ICPC (high income level countries) may be funded only if: EU contribution is essential to carry out the action (to be explained in the proposal, unique expertise and no alternative funds sources) or Provision is made to that effect in the Work Programme or in the call for proposals or Such funding is provided for in a bilateral scientific/tech. agreement between EU and the third country (not applicable for call 2013)

Overview of the Evaluation Process Briefing 13 December 20 Feb 2013 Submission Individual evaluation Consensus Panel Finalisation Full Proposal Proposal forms Eligibility Call publication: 10 July 2012 Deadline: 22 November Evaluators Criteria 14 Dec 21 Jan IER Evaluators CR Criteria W1: 28 Jan 1 Feb W2: 4-8 Feb W3: 11-15 Feb Hearings 18-19 Feb Evaluators Criteria ESR Proposals in suggested priority order Ethical Screening Individual Consensus Mar - Apr Info-letter & Redress Final ranking list Rejection list May - July Security Scrutiny Individual Consensus Feb - May

Eligibility checks 1- Receipt of proposal by REA before the deadline date and time established in the call 2- Minimum conditions: number of participants - as set out in WP (Only information provided in part A will be used to determine whether the proposal is eligible with respect to the minimum number of eligible participants) Budget: NO eligibility criteria in 2013 call 3- Completeness of proposal Presence of all requested administrative forms (Part A) and the content description (Part B) Part B of the proposal shall be readable, accessible and printable. 4- In scope of the call: the content of the proposal must match to the topic(s) and funding scheme(s) set out in that part of the work programme open in the call. A proposal will only be deemed ineligible on grounds of scope in clear-cut cases. 5- Proposals containing any classified information shall be declared ineligible. If the question of eligibility is not clear-cut: Eligibility review committee

WP Specific issues (1) Multidisciplinary and mission-oriented Up to 75% funding (just for the Security research) EU funding for research activities of industrial participants may reach a maximum of 75%: very limited market size and a risk of market failure, and for accelerated equipment development in response to new threats. Applicants need to demonstrate this requirement in their proposal

WP Specific issues (2) Active involvement of end users is considered of utmost importance: Direct participation of user organisations implementing research actions Other forms of indirect participation might also be followed Networks of security research stakeholders are key in disseminating results to end users, national public authorities and citizens

WP Specific issues (3) The broad involvement of SMEs in consortia is highly encouraged explicitly mentioned in the description of the topics SMEs open topics 7.2-1: Solutions for frequent petty crimes 7.6-1: Serious gaming to improve intelligence analysis Sensitive activities and information not in the proposal provisions must be foreseen for use of classified background or production of classified foreground if relevant

WP Specific issues (4) Societal impact of the proposed technologies must be addressed NEW: Societal checklist!! Ensuring security research: meets the needs of society benefits society does not have negative impacts on society Dual use technologies (both civilian and defence applications) might be covered (EDA coord) Standards are crucial for interoperability Concrete achievements are strongly encouraged (expected impact) Ethical issues are essential in the core of the project development

WP Specific issues (5) All actions are open to international cooperation also of high level income countries. The proposal shall clearly explain how far the contribution is essential in order to better assess their potential co-funding Topic 2.4-1 is earmarked for enhanced international cooperation through a recommended participation of internal cooperation countries (INCO), EU financial contribution is thus specifically foreseen. Follow-up to discussion with international research partners and US Homeland Security Research Dept General principles: - co-financing - non-profit (reimbursement of costs) - no overcompensation of costs - no double funding

Ethics in Security research Health information Criminal justice Financial information Privacy and data protection Dual use Human data collection, tests Genetic information Location information Cultural information Direct military use Research having a potential for terrorist abuse Are humans part of test or demonstration? Are personal data stored and processed to avoid reconciliation of data with identity? Is there any tracking of people? Is informed consent mentioned?

Surveille Ethics Advisory Service For individual companies, research consortia, and projects Objective, confidential, constructive and free advice on ethical issues arising from technology research and development Delivered by experts in security and technology ethics Launches Autumn 2012. To register an expression of interest www.surveilleadvisoryservice.eu

Funding schemes (1) Collaborative projects: Small and medium-scale focused research projects (CP- FP): - Capability Projects - indicative EU funding ~ 3.5M (No eligibility criteria) Large-scale integrating projects (CP IP): - Demo Projects II & Integration projects - indicative EU funding >3.5M (No eligibility criteria) CPs to be as small and simple as possible and as large as necessary

Demonstration Phase II projects Large Demonstrators Maritime Border Security Security of Mass Transportation CBRNE Supply Chain & Logistics Topic SEC-2013.2.4-1 Phase II demonstration programme on logistics and supply chain security Crisis management Topic SEC-2013.4.1-1 Phase II demonstration programme on aftermath crisis management

Funding schemes (2) Coordination and Support actions (No research): CA (or networking): Coordinating research activities and policies SA: Contributing to the implementation of the FPs and to prepare future EU RTD policy or the development of synergies with other policies, or to stimulate, encourage and facilitate the participation of SMEs, civil society organisations and their networks, or small research teams and newly developed or remote research centres in the activities of the thematic areas of the Cooperation programme. normally focus on one specific activity and often one specific event Core activities: studies, networking, exchanges of personnel, exchange and dissemination of good practices, the definition and organisation of joint or common initiatives, meetings, conferences and events etc. and the management of the action

Funding schemes (summary) Funding scheme Typical funding Typical duration (Years) Activities Capability projects ~ 3,5M 2-4 small or medium-scale focused research project (CP-FP) Collaborative Project Integration projects >3,5M 3-4 large scale integrating project (CP-IP) Demo Phase II projects ~ 20 M 3-4 large scale systems of systems demonstrations Coordination and support actions Networks of Excellence Demo Phase I Projects ~ 1 M 1 strategic roadmaps CSA 0,5-1 M 0,5-3 NoE - CA: coordinating research activities and policies - SA: contributing to the implementation of the FP and to prepare future research policy stakeholders combination/integration of activities/capacities in a given field, JPA Demonstration Programme

CP-CSA Pre Operational Validation (POV) POV differs from and complement the other schemes, by involving directly and supporting financially end-user agencies (public national/european authorities) To support the demand side of research, rather than the supply side, in their direct quest for new security solutions. Funding purposes: (i) the coordination of relevant institutions or authorities, acting as certifiers of new technologies (100% support) implemented via CSA; and (ii) the actual implementation of the corresponding calls for tenders (50% support), for testing/validation of novel security solutions (implemented according to the own criteria and specifications of the participating institutions or authorities) implemented via CP. Funding scheme: a combination of CSA (for coordination of validation policies) and CP (for implementation of testing and validation) 2 topics: Topic SEC-2013.3.2-1 Pre-Operational Validation (POV) on land borders Topic SEC-2013.5.3-2 Testing the interoperability of maritime surveillance systems

FP7-SEC-2013: Topics Activity 1- Security of the Citizens 10 N Orientation paper with topics published in the participant portal under FP7_Documentation 2- Security of infrastructures and utilities 13 3- Intelligent surveillance & border security 4- Restoring security and safety in crisis 9 5- Security systems integration, interconnectivity and interoperability 6- Security and society 7 6 5 Funding Scheme N Activity CP-IP 13 1,2,3,4&5 CP-FP 26 All CSA 11 1,2,3,4,6&7 7- Security research coordination and structuring 4 CP-FP/CSA 2 2&6 CP-CSA 2 3&5 NoE 0

Activity: 10.1 Increasing the Security of the Citizens SEC-2013.1.1-1 Serious organised economic crime SEC-2013.1.1-2 Stronger Identity for EU citizens SEC-2013.1.3-1 Inhibiting the use of explosives precursors SEC-2013.1.4-1 Smart and protective clothing for law enforcement and first responders SEC-2013.1.4-2 Development of a Common European Framework for the application of new technologies in the collection and use of evidence SEC-2013.1.5-1 European toolbox, focusing on procedures, practices and guidelines for CBRN forensic aspects SEC-2013.1.6-1 Framework and tools for (semi-) automated exploitation of massive amounts of digital data for forensic purposes SEC-2013.1.6-2 Novel technologies and management solutions for protection of crowds SEC-2013-1.6-3 Surveillance of wide zones: from detection to alert SEC-2013-1.6-4 Information Exploitation

Activity: 10.2 Security of infrastructures and utilities SEC-2013.2.1-1 Evidence based and integral security concepts for government asset protection SEC-2013.2.1-2 Impact of extreme weather on critical infrastructure SEC-2013.2.2-1 A research agenda for security issues on land transport SEC-2013.2.2-2 Toolbox for pandemics or highly dangerous pathogens in transport hubs Capability Project SEC-2013.2.2-3 Protection of smart energy grids against cyber attacks SEC-2013.2.2-4 Cost effectiveness of security measures applied to renewable/distributed energy production and distribution SEC-2013.2.2-5 Security of ground based infrastructure and assets operating space systems SEC-2013.2.4-1 Phase II demonstration programme on logistics and supply chain security SEC-2013.2.4-2 Non-military protection measures for merchant shipping against piracy SEC-2013.2.5-1 Developing a Cyber crime and cyber terrorism research agenda SEC-2013.2.5-2 Understanding the economic impacts of Cyber crime in non-ict sectors across jurisdictions SEC-2013.2.5-3 Pan European detection and management of incidents/attacks on critical infrastructures in sectors other than the ICT sector (i.e. energy, transport, finance, etc) SEC-2013.2.5-4 Protection systems for utility networks

Activity: 10.3 Intelligent surveillance and border security SEC-2013.3.2-1 Pre-Operational Validation (POV) on land borders SEC-2013.3.2-2 Sensor technology for under foliage detection SEC-2013.3.2-3 Mobile equipment at the land border crossing points SEC-2013.3.4-1 Border checkpoints - hidden human detection SEC-2013.3.4-2 Extended border security - passport breeder document security SEC-2013.3.4-3 Security checks versus risk at borders

Activity: 10.4 Restoring security and safety in case of crisis SEC-2013.4.1-1 Phase II demonstration programme on aftermath crisis management SEC-2013.4.1-2 Better understanding of the cascading effect in crisis situations in order to improve future response and preparedness and contribute to lower damages and other unfortunate consequences SEC-2013.4.1-3 Development of simulation models and tools for optimising the predeployment and deployment of resources and the supply chain in external emergency situations SEC-2013.4.1-4 Development of decision support tools for improving preparedness and response of Health Services involved in emergency situations SEC-2013.4.1-5 Preparing societies to cope with large scale and/or cross border crisis and disasters SEC-2013.4.1-6 Preparedness for and management of large scale forest fires SEC-2013.4.2-1 Fast rescue of disaster surviving victims: Simulation of and situation awareness during structural collapses including detection of survivors and survival spaces SEC-2013.4.3-1 Shaping immediate relief action in line with the goals of development co-operation in post crisis / post conflict societies to maintain stability SEC-2013.4.4-1 Tools for detection, traceability, triage and individual monitoring of victims after a mass CBRN contamination

Activity: 10.5 Security systems integration, interconnectivity and interoperability SEC-2013.5.1-1 Analysis and identification of security systems and data set used by first responders and police authorities SEC-2013.5.1-2 Audio and voice analysis, speaker identification for security applications SEC-2013.5.3-1 Definition of interoperability specifications for information and meta-data exchange amongst sensors and control systems SEC-2013.5.3-2 Testing the interoperability of maritime surveillance systems SEC-2013.5.4-1 Evaluation and certification schemes for security products

Activity: 10.6 Security and society SEC-2013.6.1-1 The impact of social media in emergencies SEC-2013.6.1-2 Varying forms of terrorism SEC-2013.6.1-3 Trafficking in Human Beings: analysis of criminal networks for more effective counter-trafficking SEC-2013.6.2-1 Facilitators for assistance among EU Member States in emergencies in the EU SEC-2013.6.3-1 Horizon scanning and foresight for security research and innovation SEC-2013.6.3-2 The evolving concept of security SEC-2013.6.5-1 Synthesis of results and reviewing of ethics, legal and justice activities in Security research in FP7

Activity: 10.7 Security Research coordination and structuring SEC-2013.7.2-1 Open topic for Small and Medium Enterprises: Solutions for frequent petty crimes that are of high impact to local communities and citizens SEC-2013.7.3-1 Increasing the engagement of civil society in security research SEC-2013.7.4-1 Trans-national cooperation among public security research stakeholders SEC-2013.7.6-1 Open topic for Small and Medium Enterprises: Use of serious gaming in order to improve intelligence analysis by law enforcement agents

WP & SME s The broad involvement of SMEs in consortia is highly encouraged. Topics concerned by this specific action are explicitly mentioned in the description of the topics Moreover, in order to further promote the participation of SMEs in the Security theme, two open topics for SMEs have been included in part II of this Work Programme.

Proposers for these topics should look for an enhanced SME participation as described in Part 1 of the Work Programme Topic SEC-2013.1.6-1 Framework and tools for (semi-) automated exploitation of massive amounts of digital data for forensic purposes (CP-IP) Topic SEC-2013.3.2-3 Mobile equipment at the land border crossing points (CP-FP) Topic SEC-2013.4.1-4 Development of decision support tools for improving preparedness and response of Health Services involved in emergency situations (CP-FP) Topic SEC-2013.4.2-1 Fast rescue of disaster surviving victims: Simulation of and situation awareness during structural collapses including detection of survivors and survival spaces (CP-IP) Topic SEC-2013.5.1-2 Audio and voice analysis, speaker identification for security applications (CP-IP) Topic SEC-2013.6.1-1 The impact of social media in emergencies (CP-FP) In addition Topic SEC-2013.2.4-1 Phase II demonstration programme on logistics and supply chain security: The valuable participation of qualified research performing SMEs shall be considered as a factor of merit of the proposal.

Two open topics for SME s (1) For each project/consortium, the following recommendations apply: at least 50% of the EU funding should go to eligible SMEs; small-sized projects are encouraged (up to 1.5 million EC Funding); the project duration should be up to 2 years; small consortia (3-7 partners) are encouraged; SME coordinators are encouraged but they are by no means mandatory lack of prior FP7 experience should not be seen as a handicap for an SME coordinator; and at least one end-user should be included in the consortium.

Two open topics for SME s (2) Topic SEC-2013.7.2-1 Open topic for Small and Medium Enterprises: Solutions for frequent petty crimes that are of high impact to local communities and citizens" (CP-FP) Aim: improve security in local communities and for citizens. Should address: insecurities towards local communities (Citizens & Business). Should identify and then look into solutions for frequent but low-intensity sources of insecurity having high impact on C&C. Innovative research and development work, leading to low cost technology based solutions, meeting the needs and financial expectations of C&C. The cost to benefit ratio of the proposed solution should be analysed against the impact of the threats. Indicative research areas could be for instance: 1. to develop new technologies/methods to protect local business and/or citizens from theft and/or extortion and/or fraud; 2. to develop new technologies/methods for the general protection of citizens from physical violence; 3. to develop a technology method for the general protection of private and public properties against vandalism (e.g. train/subway stations, facades/walls, cars, etc.); and 4. any other field relevant for frequent in-security situations that are of high impact to local community businesses and citizens.

Two open topics for SME s (3) Topic SEC-2013.7.2-1 Open topic for Small and Medium Enterprises: Solutions for frequent petty crimes that are of high impact to local communities and citizens" (CP-FP) Projects with strong SME participation (led by SMEs). May also support the acquisition of technologies / knowledge needed for SMEs (bringing together SMEs with the researcher community that are typically out of the reach of SMEs) Help SMEs providing real solutions for real issues. Expected Impact: Innovative low cost solutions will be developed that reduce crime against local communities, businesses and citizens. Should be leading to demonstrable positive impacts. These solutions should offer the prospect of export of goods/services from the EU to global markets.

Two open topics for SME s (4) Topic SEC-2013.7.6-1 Open topic for Small and Medium Enterprises: Use of serious gaming in order to improve intelligence analysis by law enforcement agents (CP-FP) To improve the creative, reasoning skills and reflexes of the law enforcement agents. Objective: to develop gaming solutions that address the requirements of the civil security intelligence analysis community. Research is required in two stages: 1.to capture the way analysts have to think, using both deduction and induction, and exploiting fully their skills, knowledge, experience and creativity. 2.research must develop new approaches on how technology can support training and development. Must consider the psychological, behavioural, technical and pedagogical issues in order to develop innovative training approaches, processes, procedures and methodologies. Expected impact: Objective: to develop solutions that address the requirements of the civil security intelligence analysis community. Research beyond E-learning and already existing virtual classroom. SMEs will play a more active role in the development of new innovative technologies or services in the serious gaming area.

SMEs Funding in Security Research Eighth Progress Report on SMEs participation in FP7: 2007 2011 (1 February 2012) Percentage of the EU Contribution going to SMEs (Cooperation Programme) 1 January 2012 25% 22,8% 21,5% 20% 15% 12,4% 12,0% 15,0% 18,0% 17,3% 14,2% 15,3% 10% 9,4% 5% 5,4% 0% HEALTH KBBE ICT NMP ENERGY ENV TPT SSH SPA SEC All Themes % to SMEs

Recommendations (1) Follow the FP7 guides (definition of the funding schemes, scope of topics, eligibility rules, etc) Foresee the take up of the results of your research Describe the perspective of a wider and general use of expected results Be aware of the 3 evaluation criteria and sub-criteria by funding scheme: Scientific and technical quality Implementation Impact

Recommendations (2) Evaluation criteria applicable to Collaborative project proposals S/T QUALITY Scientific and/or technological excellence (relevant to the topics addressed by the call) Soundness of concept, and quality of objectives Progress beyond the state-of-the-art Quality and effectiveness of the S/T methodology and associated work plan IMPLEMENTATION Quality and efficiency of the implementation and the management Appropriateness of the management structure and procedures Quality and relevant experience of the individual participants Quality of the consortium as a whole (including complementarity, balance) Appropriateness of the allocation and justification of the resources to be committed (staff, equipment ) IMPACT Potential impact through the development, dissemination and use of project results Contribution, at the European [and/or international] level, to the expected impacts listed in the work programme under the relevant topic/activity Appropriateness of measures for the dissemination and/or exploitation of project results, and management of intellectual property. Refer to the specific criteria for the relevant Funding Scheme! The innovation dimension of a proposal will be evaluated under CR3 'impact : With regard to the innovation dimension, describe the potential areas and markets of application of the project results and the potential advantages of the resulting technologies/ solutions compared to those that are available today. With regard to the innovation dimension, describe the measures you propose to increase the likelihood of market uptake of project results, such as: verification, testing, and prototyping; supporting the development of technical standards; identifying and collaborating with potential users; identifying potential partners and sources of finance for commercialisation.

Recommendations (3) Evaluation criteria applicable to Collaborative project proposals S/T QUALITY Scientific and/or technological excellence (relevant to the topics addressed by the call) Soundness of concept, and quality of objectives Progress beyond the state-of-the-art Quality and effectiveness of the S/T methodology and associated work plan IMPLEMENTATION Quality and efficiency of the implementation and the management Appropriateness of the management structure and procedures Quality and relevant experience of the individual participants Quality of the consortium as a whole (including complementarity, balance) Appropriateness of the allocation and justification of the resources to be committed (staff, equipment ) IMPACT Potential impact through the development, dissemination and use of project results Contribution, at the European [and/or international] level, to the expected impacts listed in the work programme under the relevant topic/activity Appropriateness of measures for the dissemination and/or exploitation of project results, and management of intellectual property. Refer to the specific criteria for the relevant Funding Scheme! The societal dimension of a proposal will be evaluated under CR3 'impact : Ensuring security research meets the needs of society Ensuring security research benefits society Ensuring security research does not have negative impacts on society

Recommendations (4) Address ethical, societal and sensitiveness issues within the proposal Justify the real innovative aspects (Incremental versus breakthrough) The size of projects and of consortia should be the result of the intended project objectives and not the other way round! Clearly explain/justify the project budget Within the partnership look for the right expertise needed for reaching the proposal objectives: end users, private and public, academia, industry, SMEs, etc: Avoid sleeping partners without real contribution, Avoid redundant partnerships, But the involvement of SMEs and relevant End Users is encouraged!

Recommendations (5) Present an overall vision of market deployment Check/link the project with relevant ongoing or finished EU/international research projects Clearly present the state of the art! Proof-read your proposal by a neutral person Make the reading of an evaluator easy: Use a simple and clear language Be short and concise Clearly define objectives, milestones and deliverables Use tables and graphs, etc Respect the page limits: Applicants must ensure that proposals conform to the page limits and layout given in the GfA And do not leave the proposal submission to the last minute!

From Calls to Projects Call1 (2007-2008) 156 million 48 projects Joint Call SEC-INFSO 20 million 9 projects Call 2 (2009) 117 million 32 projects Call 3 (2010) 209 million 42 projects Call 4 (2011) 221 million 54 projects Call 5 (2012) 241 million ~ 56 projects Call 6 (2013) ± 300 million Projects description available on: http://cordis.europa.eu/fp7/security/projects_en.html ftp://ftp.cordis.europa.eu/pub/fp7/security/docs/securityresearch_catalog ue2010_2_en.pdf http://cordis.europa.eu/fp7/security/fp7-project-leaflets_en.html

Further information Security Research Info-Day on 11 September 2012 in Brussels Participants portal: http://ec.europa.eu/research/participants/portal/ Work Programme Call for proposals Guide for applicants etc. REA: http://ec.europa.eu/research/rea/ REA-security-research@ec.europa.eu DG ENTR: http://ec.europa.eu/enterprise/security/index_en.htm entr-security-research@ec.europa.eu Helpdesk Centralised FP7 Enquiries Service: http://ec.europa.eu/research/enquiries National Contact Points: http://cordis.europa.eu/fp7/ncp_en.html http://www.seren-project.eu Security projects on CORDIS: http://cordis.europa.eu/fp7/security/projects_en.html