TOPIC : Value-sensitive technological innovation in Cybersecurity
|Publication date:||11 December 2013|
|Types of action:||CSA Coordination and support action|
|DeadlineModel: Opening date:||single-stage 25 March 2015||Deadline:||27 August 2015 17:00:00|
|Time Zone : (Brussels time)|
New digital technologies are all around us but their impact on society is often difficult to assess, let alone predict. The rapid development and expansion of the digital ecosystem confronts society with numerous challenges to ensure trust and confidence of citizens in and the legitimacy of highly complex, dynamic and hyper-connected systems.
As recognized in the EU Cybersecurity Strategy the same norms, principles and values that the EU upholds offline, should also apply online. The challenge is to define what is needed to ensure a flourishing information society which offers safety and security and at the same time respects Europe's fundamental values and rights.
It is therefore essential to ensure that new and innovative cybersecuirty technologies are designed to incorporate European values and fundamental rights, which include autonomy, equality, privacy, combined with fairness and accountability and ensure the 'right' level of control individuals can exercise over their actions and the technology they utilize. Often, these values might be in competition with one another.
In this context, it is also crucial to understand the role of the public and the private sector concerning the acceptance and acceptability of digital technologies in a networked environment in order to allow citizens to make informed and responsible choices regarding innovative products and services leading to a strong European market for innovative and effective cybersecurity technology.
Proposals are encouraged to engage with public security end-users and/or private end users.
The coordination and support activity should facilitate community building and deepen understanding involving relevant stakeholders from civil society, research, industry and public bodies in order to develop a comprehensive knowledge for the EU of the challenges and opportunities for value-sensitive ICT innovation in a trustworthy digital society.
In particular, work in this topic should focus on:
- Developing ways to determine the relation between the perceived risks and benefits of new technologies in the field of digital security and their associated acceptability and acceptance;
- Defining mechanisms to determine how our fundamental values and rights can be taken into account in the development process of new technologies to ensure that they are applied when used in innovative services and products;
- Proposing rules and guidance on how these new technologies will safeguard these values and rights;
- Identifying existing best practices on cybersecurity norms and rules accommodating European values and rights;
- Drafting standards and guidelines for industry and the public sector to enable consumers to exert a high level of control over devices and services as well as to ensure accountability with respect to the acceptable usage of new digital technologies; and
- Identifying the key factors for promoting a secure and innovative ecosystem through fostering the creation of secure technologies in line with European values.
- Addressing the specific needs of the end-user, private and public security end user alike.
- Better understanding of the mechanisms that lead to the acceptance of risks associated with new digital services in a networked environment and of the ways how acceptability of new services can be maintained;
- Providing better understanding of the links between risk perception of societies and cyber security;
- Deeper insight into how networked ICT, autonomous system and devices as well as services influence the perception of citizens with respect to security and their values of for instance freedom and autonomy;
- New approaches for users to exercise control over their data and maintain the desired autonomy of their actions in the digital domain while instigating innovative business models for value-sensitive ICT products and services;
- Recommendations for regulatory measures necessary for a responsible and sustainable development and use of cyber technology; and
- Establishment of a broad and durable constituency, which supports the uptake of results and further work beyond the lifetime of the project.
Type of action: One Coordination & Support Action
Topic conditions and documents
Please read carefully all provisions below before the preparation of your application.
The budget breakdown for this call is given in the call conditions section of the work programme.
- List of countries and applicable rules for funding: described in part A of the General Annexes of the General Work Programme.
- Eligibility and admissibility conditions: described in part B and C of the General Annexes of the General Work Programme
3.1 Evaluation criteria and procedure, scoring and threshold: described in part H of the General Annexes of the General Work Programme
3.2 Guide to the submission and evaluation process
- Proposal page limits and layout: Please refer to Part B of the standard proposal template.
- Indicative timetable for evaluation and grant agreement:
Information on the outcome of one-stage evaluation: maximum 5 months from the final date for submission.
Signature of grant agreements: maximum 8 months from the final date for submission.
- Provisions, proposal templates and evaluation forms for the type(s) of action(s) under this topic:
Coordination and Support Action:
Specific provisions and funding rates
Standard proposal template (administrative forms and structure of technical annex)
Standard evaluation form
Annotated Model Grant Agreement
- Additional provisions:
Horizon 2020 budget flexibility
Technology readiness levels (TRL) – where a topic description refers to TRL, these definitions apply.
Financial support to Third Parties – where a topic description foresees financial support to Third Parties, these provisions apply.
- Open access must be granted to all scientific publications resulting from Horizon 2020 actions, and proposals must refer to measures envisaged. Where relevant, proposals should also provide information on how the participants will manage the research data generated and/or collected during the project, such as details on what types of data the project will generate, whether and how this data will be exploited or made accessible for verification and re-use, and how it will be curated and preserved.
- Flash call info en
- Explanatory note on exclusive focus on civil applications en
- Explanatory note on potential misuse of research en
- Explanatory note on the control of export for dual-use items en
- Guidance - Guidelines for the classification of research results en
- Legal basis - Framework Programme H2020 en
- Legal basis - Specific Programme H2020 en
- WP H2020 - 1. Introduction en
- WP H2020 - 14. Secure societies - protecting freedom and security of Europe and its citizens en
- WP H2020 - 17. Communication and Dissemination en
- WP H2020 - 19. General Annexes en
- A guide to ICT-related activities in WP2014-15 en
No submission system is open for this topic.
National Contact Points (NCP) – contact your NCP for further assistance.
Enterprise Europe Network – contact your EEN national contact point for advice to businesses with special focus on SMEs. The support includes guidance on the EU research funding.
Ideal-IST partner search facility
Research Enquiry Service – ask questions about any aspect of European research in general and the EU Research Framework Programmes in particular.
IT Helpdesk – contact the Participant Portal IT helpdesk for questions such as forgotten passwords, access rights and roles, technical aspects of submission of proposals, etc.
European IPR Helpdesk assists you on intellectual property issues.
Partner Search Services helps you find a partner organisation for your proposal.
H2020 Online Manual your online guide on the procedures from proposal submission to managing your grant.