Navigation path

ISEC 2013 Targeted Call for Proposals

Applications to each the ISEC 2013 Targeted Call for Proposals have to be submitted electronically via the PRIAMOS system. Applicants are strongly urged not to wait until the last day to apply. It is not possible to upload applications after the deadline.

ISEC 2013 Targeted Call for Proposals

  1. Illegal use of Internet (INT) pdf - 459 KB [459 KB] , deadline 7 October 2013 (12:00 CET)
    19 September 2013: Updated version
  2. Financial and Economic Crime (FINEC) pdf - 463 KB [463 KB] , deadline 7 October 2013 (12:00 CET)
    19 September 2013: Updated version
  3. Chemical, Biological, Radiological and Nuclear materials (CBRN) pdf - 459 KB [459 KB] , deadline 9 October 2013 (12:00 CET)
    19 September 2013: Updated version
  4. Radicalisation leading to terrorism and the role of victims of terrorism in preventing radicalisation (RAD) pdf - 458 KB [458 KB] , deadline 9 October 2013 (12:00 CET)
    19 September 2013: Updated version
  5. Trafficking in Human Beings (THB) pdf - 458 KB [458 KB] , deadline 31 October 2013 (12:00 CET)
    19 September 2013: Updated version

Documents

Additional tools




Glossary

Trafficking in human beings

The recruitment, transportation, transfer, harbouring or reception of persons, including the exchange or transfer ...

+

Specific Programme "Prevention of and Fight against Crime" (ISEC)

This programme contributes to citizens' security by preventing and combating crime, in particular terrorism...

+

Sexual exploitation

Any actual or attempted abuse of a position of vulnerability, power differential or trust for sexual purposes, including, but not limited to, profiting monetarily, socially or politically from the sexual exploitation of another.

+

Organised crime

Activities of large-scale criminal and terrorist networks, including terrorism, international drugs trafficking, trafficking ...

+

Money laundering

The attempt to conceal or disguise the ownership or source of the proceeds of criminal activity and to integrate ...

+

Cybercrime

Offences against the confidentiality, integrity and availability of computer data and systems (illegal access and ...

+

Counterfeiting

Unauthorized representation of a registered trademark carried on goods identical or similar to goods for which the ...

+

Corruption

The abuse of power for private gain (in both the public and the private sector).

+