Suche nach Schlagworten '00008197'

56 entries found on 3 pages. starting on record 41 ending on 56

Sort by: Title, Year, Author (Corp. Body),

1 | 2 | 3
« Previous
Next »
Title: Study on the development of statistical data on the European security technological and industrial base : Security
Sector Survey Analysis: France
Abstract
This Background Report has been produced as part of the study on “Development of statistical data on the European security technological and industrial base” commissioned by the European Commission within the Framework Contract on Security (ENTR/09/050) between the European Commission and a consortium led by Ecorys Nederland B.V. in collaboration with TNO and DECISION.The Background Report provides an overview of initial findings from a survey of companies active in the (civil) security sector in Germany. It is one of a series of reports covering findings from surveys conducted for: Estonia, France, Italy, Poland, Spain and the United Kingdom. The survey design and subsequent data analysis has been undertaken by Ecorys, while the actual surveying of companies has been conducted by GfK, a specialist market research company. The individual country surveys of companies have been conducted over the period October 2014 to February 2015.To obtain comparable data for Germany, Ecorys has collaborated with the Brandenburg Institute for Society and Security (BIGS) who have conducted a similar survey in 2012 based on a common survey questionnaire design. This survey has been implemented as a follow-up round to previous surveys of companiesactive in the (civil) security sector in Germany undertaken by BIGS.[Author vide copyright]
Table of Contents
Preface
1 Introduction
1.1 General context
1.2 Aim of this report
1.3 Structure of the report
2 Survey overview
2.1 Survey implementation
2.2 Survey population
2.3 Coverage and response rate
2.4 Survey instrument and method
2.5 Field report
2.5.1 Field time
2.5.2 Length of interviews
2.6 Data preparation and testing
3 Descriptive analysis
3.1 Security ‘threat’ categories
3.2 Areas of economic activity
3.3 Broad segmentation of security products and services
3.4 Cyber security
3.4.1 Cyber security products and services
3.4.2 Cyber/IT business activities
3.5 ‘Other’ security product providers
3.5.1 ‘Other’ security products
3.5.2 ‘Other’ security products business activities
3.6 ‘Other’ security service providers
3.6.1 ‘Other’ security services
3.7 Security market by economic sector (end-user)
3.7.1 Overall – all products and services
3.7.2 Breakdown by main broad category of security products and services
3.8 Security market by geographical region
3.8.1 Geographical markets – all products and services
3.8.2 Breakdown by main broad category of security products and services
3.9 Firm structure: employment and turnover
3.9.1 Employment
3.9.2 Turnover
3.10 Growth performance and prospects
3.10.1 Past turnover growth performance
3.10.2 Future turnover growth prospects
3.10.3 Future demand prospects by broad customer group and geographical area
3.11 Competitors
3.11.1 Geographical origin of main competitors – all products and services
3.11.2 Breakdown by main broad category of security products and services
3.11.3 Future competition prospects by geographical origin of main competitor
| 4 Aggregate estimates of the size of the security industry
4.1 Overview of approach
4.2 Method for the estimation of aggregate turnover and employment for the surveysample
4.2.1 Underlying assumptions
4.2.2 Estimation of turnover for non-declaring respondents
4.2.3 Estimation of employment levels for employment - size class ‘1000 or more employees’
4.2.4 Estimation of sample average values of employment and turnover per firm
4.3 Method for the initial estimation of aggregate turnover and employment
4.3.1 Underlying assumptions
4.3.2 Calculation of the initial estimate of the population of security companies
4.4 Variants and sub-groups
4.4.1 Adjustment for possible defence-related turnover and employment (variant)
4.4.2 Estimation of turnover and employment bymain broad industry category (sub-groups)
4.5 Size of the security industry: survey estimates and aggregate (national) extrapolation
4.5.2 Comparison of estimators
A.1. Product and services segmentation
A.2. Market Segmentation
Author (Corp. Body): Ecorys
Contributer: TNO | Europäische Kommission / Generaldirektion Migration und Inneres | DECISION
Year: 2015
Language: en
Ressource: Einzelne Berichte, Studien
Keyword: data securityserviceEUfire brigadeFranceinternetpolicesecurity
security policyespionagestatisticsenterprise
Subject: European Community law in general
Countries Scheme: Europe. General ResourcesFrance
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
Title: Study on the development of statistical data on the European security technological and industrial base : Security
Sector Survey Analysis: Italy
Abstract
This Background Report has been produced as part of the study on “Development of statistical data on the European security technological and industrial base” commissioned by the European Commission within the Framework Contract on Security (ENTR/09/050) between the European Commission and a consortium led by Ecorys Nederland B.V. in collaboration with TNO and DECISION.The Background Report provides an overview of initial findings from a survey of companies active in the (civil) security sector in Germany. It is one of a series of reports covering findings from surveys conducted for: Estonia, France, Italy, Poland, Spain and the United Kingdom. The survey design and subsequent data analysis has been undertaken by Ecorys, while the actual surveying of companies has been conducted by GfK, a specialist market research company. The individual country surveys of companies have been conducted over the period October 2014 to February 2015.To obtain comparable data for Germany, Ecorys has collaborated with the Brandenburg Institute for Society and Security (BIGS) who have conducted a similar survey in 2012 based on a common survey questionnaire design. This survey has been implemented as a follow-up round to previous surveys of companiesactive in the (civil) security sector in Germany undertaken by BIGS.[Author vide copyright]
Table of Contents
Preface
1 Introduction
1.1 General context
1.2 Aim of this report
1.3 Structure of the report
2 Survey overview
2.1 Survey implementation
2.2 Survey population
2.3 Coverage and response rate
2.4 Survey instrument and method
2.5 Field report
2.5.1 Field time
2.5.2 Length of interviews
2.6 Data preparation and testing
3 Descriptive analysis
3.1 Security ‘threat’ categories
3.2 Areas of economic activity
3.3 Broad segmentation of security products and services
3.4 Cyber security
3.4.1 Cyber security products and services
3.4.2 Cyber/IT business activities
3.5 ‘Other’ security product providers
3.5.1 ‘Other’ security products
3.5.2 ‘Other’ security products business activities
3.6 ‘Other’ security service providers
3.6.1 ‘Other’ security services
3.7 Security market by economic sector (end-user)
3.7.1 Overall – all products and services
3.7.2 Breakdown by main broad category of security products and services
3.8 Security market by geographical region
3.8.1 Geographical markets – all products and services
3.8.2 Breakdown by main broad category of security products and services
3.9 Firm structure: employment and turnover
3.9.1 Employment
3.9.2 Turnover
3.10 Growth performance and prospects
3.10.1 Past turnover growth performance
3.10.2 Future turnover growth prospects
3.10.3 Future demand prospects by broad customer group and geographical area
3.11 Competitors
3.11.1 Geographical origin of main competitors – all products and services
3.11.2 Breakdown by main broad category of security products and services
3.11.3 Future competition prospects by geographical origin of main competitors
| 4 Aggregate estimates of the size of the security industry
4.1 Overview of approach
4.2 Method for the estimation of turnover and employment for the survey sample
4.2.1 Underlying assumptions
4.2.2 Estimation of turnover for non-declaring respondents
4.2.3 Estimation of employment levels for employment - size class ‘1000 or more employees’
4.2.4 Estimation of sample average values of employment and turnover per firm
4.3 Method for the initial estimation of aggregate turnover and employment
4.3.1 Underlying assumptions
4.3.2 Calculation of the initial estimate of the population of security companies
4.3.3 Calculation of initial estimates of aggregate (national) turnover and employment
4.4 Variants and sub-groups
4.4.1 Adjustment for possible defence-related turnover and employment (variant)
4.4.2 Estimation of turnover and employment by main broad industry category (sub-groups)
4.5 Size of the security industry: survey estimates and aggregate (national) extrapolation
Annexes
Product and services segmentation
Market Segmentation
Author (Corp. Body): Ecorys
Contributer: TNO | Europäische Kommission / Generaldirektion Migration und Inneres | DECISION
Year: 2015
ISBN / ISSN / Kat.Nr: FU98408
Language: en
Ressource: Einzelne Berichte, Studien
Keyword: data securityserviceEUfire brigadeinternetItalypolicesecurity
security policyespionagestatisticsenterprise
Subject: European Community law in general
Countries Scheme: Europe. General ResourcesItaly
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
Title: Study on the development of statistical data on the European security technological and industrial base : Security
Sector Survey Analysis: Poland
Abstract
This Background Report has been produced as part of the study on “Development of statistical data on the European security technological and industrial base” commissioned by the European Commission within the Framework Contract on Security (ENTR/09/050) between the European Commission and a consortium led by Ecorys Nederland B.V. in collaboration with TNO and DECISION.The Background Report provides an overview of initial findings from a survey of companies active in the (civil) security sector in Germany. It is one of a series of reports covering findings from surveys conducted for: Estonia, France, Italy, Poland, Spain and the United Kingdom. The survey design and subsequent data analysis has been undertaken by Ecorys, while the actual surveying of companies has been conducted by GfK, a specialist market research company. The individual country surveys of companies have been conducted over the period October 2014 to February 2015.To obtain comparable data for Germany, Ecorys has collaborated with the Brandenburg Institute for Society and Security (BIGS) who have conducted a similar survey in 2012 based on a common survey questionnaire design. This survey has been implemented as a follow-up round to previous surveys of companiesactive in the (civil) security sector in Germany undertaken by BIGS.[Author vide copyright]
Table of Contents
4 Aggregate estimates of the size of the security industry
4.1 Overview of approach
4.2 Method for the estimation of aggregate turnover and employment for the surveysample
4.2.1 Underlying assumptions
4.2.2 Estimation of turnover for non-declaring respondents
4.2.3 Estimation of employment levels for employment - size class ‘1000 or more employees’
4.2.4 Estimation of sample average values of employment and turnover per firm
4.3 Method for the initial estimation of aggregate turnover and employment
4.3.1 Underlying assumptions
4.3.2 Calculation of the initial estimate of the population of security companies
4.3.3 Calculation of initial estimates of aggregate (national) turnover and employment
4.4 Variants and sub-groups
4.5 Size of the security industry: survey estimates and aggregate (national) extrapolation
4.5.1 Estimates of the population of security companies
4.5.2 Comparison of estimators
Annexes
A.1. Product and services segmentation
A.2. Market Segmentation
| Preface
1 Introduction
1.1 General context
1.2 Aim of this report
1.3 Structure of the report
2 Survey overview
2.1 Survey implementation
2.2 Survey population
2.3 Coverage and response rate
2.4 Survey instrument and method
2.5 Field report2.5.2 Length of interviews
2.6 Data preparation and testing
3 Descriptive analysis
3.1 Security ‘threat’ categories
3.2 Areas of economic activity
3.3 Broad segmentation of security products and services
3.4 Cyber security
3.4.1 Cyber security products and services
3.4.2 Cyber/IT business activities
3.5 ‘Other’ security product providers
3.5.1 ‘Other’ security products
3.5.2 ‘Other’ security products business activities
3.6 ‘Other’ security service providers
3.6.1 ‘Other’ security services
3.7 Security market by economic sector (end-user)
3.7.1Overall – all products and services
3.7.2 Breakdown by main broad category of security products and services
3.8 Security market by geographical region
3.8.1 Geographical markets – all products and services
3.8.2 Breakdown by main broad category of security products and services
3.9 Firm structure: employment and turnover
3.9.1 Employment
3.9.2 Turnover
3.10 Growth performance and prospects
3.10.1 Past turnover growth performance
3.10.2 Future turnover growth prospects
3.10.3 Future demand prospects by broad customer group and geographical area
3.11 Competitors
3.11.1 Geographical origin of main competitors – all products and services
3.11.2 Breakdown by main broad category of security products and services
3.11.3 Future competition prospects by geographical origin of main competitors
Author (Corp. Body): Ecorys
Contributer: TNO | Europäische Kommission / Generaldirektion Migration und Inneres | DECISION
Year: 2015
ISBN / ISSN / Kat.Nr: FU98408
Language: en
Ressource: Einzelne Berichte, Studien
Keyword: data securityserviceEUfire brigadeinternetPolandpolicesecurity
security policyespionagestatisticsenterprise
Subject: European Community law in general
Countries Scheme: Europe. General ResourcesPoland
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
Title: Study on the development of statistical data on the European security technological and industrial base : Security
Sector Survey Analysis: United Kingdom
Abstract
This Background Report has been produced as part of the study on “Development of statistical data on the European security technological and industrial base” commissioned by the European Commission within the Framework Contract on Security (ENTR/09/050) between the European Commission and a consortium led by Ecorys Nederland B.V. in collaboration with TNO and DECISION.The Background Report provides an overview of initial findings from a survey of companies active in the (civil) security sector in Germany. It is one of a series of reports covering findings from surveys conducted for: Estonia, France, Italy, Poland, Spain and the United Kingdom. The survey design and subsequent data analysis has been undertaken by Ecorys, while the actual surveying of companies has been conducted by GfK, a specialist market research company. The individual country surveys of companies have been conducted over the period October 2014 to February 2015.To obtain comparable data for Germany, Ecorys has collaborated with the Brandenburg Institute for Society and Security (BIGS) who have conducted a similar survey in 2012 based on a common survey questionnaire design. This survey has been implemented as a follow-up round to previous surveys of companiesactive in the (civil) security sector in Germany undertaken by BIGS.[Author vide copyright]
Table of Contents
Preface
1 Introduction
1.1 General Context
1.2 Aim of this report
1.3 Structure of the report
2 Survey overview
2.1 Survey implementation
2.2 Survey population
2.3 Coverage and response rate
2.4 Survey instrument and method
2.5 Field report
2.5.1 Field time
2.5.2 Length of interviews
2.6 Data preparation and testing
3 Descriptive analysis
3.1 Security ‘threat’ categories
3.2 Areas of economic activity
3.3 Broad categories of security products and services
3.4 Cyber security
3.4.1 Cyber security products and services
3.4.2 Cyber/IT business activities
3.5 ‘Other’ security product providers
3.5.1 ‘Other’ security products
3.5.2 ‘Other’ security products business activities
3.6 ‘Other’ security service providers
3.6.1 ‘Other’ security services
3.7 Security market by economic sector (end-user)
3.7.1 Overall – all products and services
3.7.2 Breakdown by main broad category of security products and services
3.8 Security market by geographical region
3.8.1 Geographical markets – all products and services
3.8.2 Breakdown by main broad category of security products and services
3.9 Firm structure: employment and turnover
3.9.1 Employment
3.9.2 Turnover
3.10 Growth performance and prospects
3.10.1 Past turnover growth performance
3.10.2 Future turnover growth prospects
3.10.3 Future demand prospects by broad customer group and geographical area
3.11 Competitors
3.11.1 Geographical origin of main competitors – all products and services
3.11.2 Breakdown by main broad category of security products and services
3.11.3 Future competition prospects by geographical origin of main competitors
| 4 Aggregate estimates of the size of the security industry
4.1 Overview of approach
4.2 Method for the estimation of turnover and employment for the survey sample
4.2.1 Underlying assumptions
4.2.2 Estimation of turnover for non-declaring respondents
4.2.3 Estimation of employment levels for employment - size class ‘1000 or more employees’
4.2.4 Estimation of sample average values of employment and turnover per firm
4.3 Method for the initial estimation of aggregate turnover and employment
4.3.1 Underlying assumptions
4.3.2 Calculation of the initial estimate of the population of security companies
4.3.3 Calculation of initial estimates of aggregate (national) turnover and employment
4.4 Variants and sub-groups
4.4.1 Adjustment for possible defence-related turnover and employment (variant)
4.4.2 Estimation of turnover and employment by main broad industry category (sub-groups)
4.5 Size of the security industry: survey estimates and aggregate (national) extrapolation
4.5.1 Estimates of the population of security companies
4.5.2 Comparison of estimators
Annexes
A.1. Product and services segmentation
A.2. Market Segmentation
Author (Corp. Body): Ecorys
Contributer: TNO | Europäische Kommission / Generaldirektion Migration und Inneres | DECISION
Year: 2015
Language: en
Ressource: Einzelne Berichte, Studien
Keyword: data securityserviceEUfire brigadeGreat Britaininternetpolicesecurity
security policyespionagestatisticsenterprise
Subject: European Community law in general
Countries Scheme: Europe. General ResourcesUnited Kingdom
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
Title: Final Evaluation of Security Research under the Seventh Framework Programme for Research, Technological Development and
Demonstration : Final Report
Abstract
This report is the Final Report of the ‘Final Evaluation of Security Research under the Seventh Framework Programme for Research, Technological Development and Demonstration (FP7)’, which was commissioned, in 2014, by Directorate-General Enterprise and Industry (DG ENTR).A consortium led by Technopolis Group and including VVA, as well as the Manchester Institute of Innovation Research, conducted the research for this study in the period from August 2014 to August2015. This report presents the detailed results and analyses, conclusions and recommendations from the evaluation.These are based on findings from data collection and analyses, drawing on desk research, data from the CORDA database, surveys of participants and end-users, stakeholder interviews, a series of case studies, and a stakeholder workshop.[Author vide copyright]
Table of Contents
1. Introduction
1.1 This report
1.2 Key parameters of the evaluation
1.3 Structure of the Report
2. Methodology
2.1 Overall approach
2.2 Desk research
2.3 Analysis of statistical data
2.4 Participant survey
2.5 End-user survey
2.6 Stakeholder interviews
2.7 Case studies
2.8 Stakeholder workshop
3. Evaluation results
3.1 Overview of FP7 Security Research Actions
3.2 Evidence Building Block 1: Rationale “why”)
3.3 Evidence Building Block 2: Implementation (“how”)
3.4 Evidence Building Block 3: Direct Achievements (“what”)
3.5 Evidence Building Block 4: Wider Achievements (“what”)
3.6 Evidence Building Block 5: European Added Value
3.7 Evidence Building Block 6: Conclusions on FP7 & outlook for H2020
4. Conclusions and recommendations
4.1 Conclusions
4.2 Recommendations
Author (Corp. Body): Technopolis Group
Contributer: Europäische Kommission / Generaldirektion Migration und Inneres
Year: 2015
ISBN / ISSN / Kat.Nr: 978-92-79-40838-0 | NB-02-14-003-EN-N
Language: en
Ressource: Einzelne Berichte, Studien
Keyword: evaluationdevelopmentEUresearchsecuritysecurity policystatisticstechnology
Subject: European Community funds and other financial instrumentsResearchOrganization of research
Countries Scheme: Europe. General Resources
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
Title: Strategic recommendations for secure societies theme in Horizon 2020 : Secure Societies ; Protecting freedom and
security of Europe and its citizens
Abstract
This document offers strategic recommendations to the European Commission on how the Secure Societies Theme in Horizon 2020 should be developed to address the longer-term priorities and opportunities. In developing this strategic recommendation the SSAG has considered a wide range of factors including in particular:User organisation priorities, indicating where research and innovation is most likely to deliver benefit to important needs and especially anticipating new trends,Approaches to the formulation of the Work Programmes that are most appropriate to generate effective outcomes and raise competitiveness of EU industry.The primary content of this document was prepared by three working groups of the SSAG(2014-2015).The scope of the Secure Societies theme is very broad and the SSAG looked at several ways to structure the discourse.[Author vide copyright]
Table of Contents
1. Executive Summary
2. Introduction
3. Innovation Roadmapping
4. Drivers for Future Work Programmes – Overview
5. Driver 1 - Societal Security & Trust of the Citizen
6. Driver 2 - Crime and Crime Prevention
7. Driver 3 – Trusted Digital Economy
8. Conclusion
Author (Corp. Body): Secure Societies Advisory Group
Contributer: Europäische Kommission / Generaldirektion Migration und Inneres
Year: 2015
Language: en
Ressource: Einzelne Berichte, Studien
Keyword: citizendata securityEUsocietyinternetcriminalitypreventionsecurity
economy
Subject: European Community law in generalVarious information networks and systems
Countries Scheme: Europe. General Resources
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
Title: Study on the development of statistical data on the European security technological and industrial base : Final Report
Abstract
In light of the challenges and needs, this study was launched with the overall aim to contribute to the development of statistical data that provide a clear picture of the technological and industrial base of the security industry in the EU. At the same time, the study has also served to contribute to the development of statistical data on the security services sector.The study was divided into two phases:The ‘Definition Phase’ which covered preparatory activities,included the formulation of a definition and delineation of the security sector. Based on this work, an inventory was made of various options available for collection and quantification of the security sector, together with an assessment of the feasibility of implementing these options. Based on this assessment, which was validated in a workshop and confirmed by the European Commission, the approach to adopted for the development of statistical data was selected;The ‘Implementation Phase’ which covered the implementation of the quantification exercise. This exercise consisted of a combination of a the analysis of existing statistical data and a company survey conducted in seven Member States (DE, EE, ES, FR, IT, PL, UK), with the purpose ofincreasingthe understanding of the structure and conduct of the security sector in the EU. The results were extrapolated to arrive at an assessment of the size, structure and performance of the overall EU security industry sector and market.[Author vide copyright]
Table of Contents
EXECUTIVE SUMMARY
Background
Methodology and approach
Findings from publicly available statistical data
Findings from the Security Sector Survey
Estimation of the overall size of the EU security industry
1 Introduction
1.1 General Context
1.2 Aim of this study
1.3 Methodology
1.3.1 Definition Phase
1.3.2 Implementation Phase
1.4 Structure of the report
2 Delineation and segmentation of the security sector
2.1 Introduction
2.2 Delineation and segmentation of the sector
2.2.1 Security definitions
2.2.2 Conceptual segmentation and delineation
2.2.3 Security threats and risks
2.2.4 Security risk and threat domains
2.2.5 Security actors
2.2.6 Security response cycle
2.2.7 Security tools (products & services)
3 Overview of data available in statistics
3.1 Private security services sector
3.1.1 Company structure
3.1.2 Number of companies
3.1.3 Employment
3.1.4 Turnover
3.2 Public security services sector
3.2.1 Police forces
3.2.2 Firefighters
3.3 EU overview
4 Comparative analysis of survey results
4.1 Survey - introduction
4.2 Comparative analysis
4.2.1 Security “threat” categories
4.2.2 Industry segmentation
4.2.3 Security market segmentation
4.2.4 Firm structure and size
4.2.5 Turnover growth
4.2.6 Competition
| 5 Estimation of national aggregate employment and turnover and extrapolation to EU level
5.1 Methodology for estimation of national level aggregate turnover and employment
5.1.1 Basic approach
5.1.2 Other underlying assumptions
5.1.3 Sub-groups and variants
5.2 Comparison of survey-based employment and turnover estimates
5.2.1 Employment(average number of employees per firm)
5.2.2 Turnover (average turnover per firm)
5.2.3 Turnover per employee
5.3 Estimates of aggregate national employment and turnover
5.3.1 Aggregate national employment and turnover (all security)
5.3.2 Aggregate national employment and turnover by broad industry category
5.4 Estimated total size of the EU security industry
6 Estimation of the breakdown of turnover and employment by products and services, business activities and markets
6.1 Methodologies for estimation of the breakdown of turnover and employment
6.1.1 Estimation of the breakdown of turnover and employment by product and service type
6.1.2 Estimation of the breakdown of turnover and employment by business activity
6.1.3 Estimation of the breakdown of turnover and employment by market segment
6.2 Estimates of the breakdown of turnover and employment by security products and services, business activities and markets
6.2.1 ‘Other’ security products
6.2.2 ‘Other’ security services
6.2.3 Cyber security services and products
Annex I: Comparative Tables
Annex II: Ecorys Survey on the Structure of the Security Industry (Ecorys SSS) - questionnaire
Author (Corp. Body): Ecorys
Contributer: TNO | Europäische Kommission / Generaldirektion Migration und Inneres | DECISION
Year: 2015
Language: en
Ressource: Einzelne Berichte, Studien
Keyword: data securityserviceEUfire brigadeGreat Britaininternetpolicesecurity
security policyespionagestatisticsenterprise
Subject: European Community law in general
Countries Scheme: Europe. General Resources
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
Title: Strategic input for 2016 - 2017 Work Programme : Secure Societies ; Protecting freedom and security of Europe and its
citizens
Abstract
The Secure Societies Advisory Group (SSAG) has considered the strategic priorities that should shape the H2020 programme for the 2016/2017...[Author vide copyright]
Author (Corp. Body): Secure Societies Advisory Group
Contributer: Europäische Kommission
Year: 2014
Language: en
Ressource: Einzelne Programme und Statuten
Keyword: data securityserviceEUresearchsocietyhuman sciencesinformation technologyinnovation
internetsecuritytechnologyenterprise
Subject: European Communities and European Union in generalVarious information networks and systems
Countries Scheme: Europe. General Resources
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
Title: Study evaluating the status quo and the legal implications of third party liability for the European security industry
Title (other): Study evaluating the status quo and the legal implications of third party liability for the European Security Industry :
Annex III – Country Reports
Abstract
Third party liability has been identified as an issue that could adversely impact the European security industry. Limitless third party liability for security product and services is believed to have the potential to reduce investments in innovation. In the US, the Safety Act (which is further discussed in Section 3, below) has been enacted to empower the government to provide protection against liability exposure. This development has convinced the EU to examine the legal implications of third party liability of the security industry and possible policy options. To this end, the Commission, DG ENTR, has commissioned this study, which has been carried out by METRO (University of Maastricht), ECTIL, and Hunton & Williams.The main objectives of this study are:To collect, analyze and assess data from various legal sources and actual best practices related to the field of third party liability;To provide a comprehensive overview on the current status of third party liability-related legal implications for security industry, To provide a portfolio of feasible policy options for the Commission to address these implications effectively, taking into account that the findings and their respective easoning will present the potential basis for wideranging policy decisions by the European Commission.Thus, this study focuses on understanding the third party liability exposure of the EU-based Security Industry (SI), analyzes the US Safety Act and its context, and identifies policy options relating to the SI’s liability exposure.[Author vide copyright]
Table of Contents
List of Abbreviations
Executive Summary
1. Introduction and background
2. Definition of security industry and methodology
3. Analysis of comparable EU legislation and related case law and potential analogy - bearing international law treaties
4. Analysis of comparable EU-Member States legislation and related case law
5. Analysis of the US Safety Act and liability system
6. Policy options
7. Conclusions
Chapter 1 Introduction
...
Chapter 2 A definition of the security industry in Europe
...
Chapter 3 Analysis of comparable EU legislation
...
Chapter 4 Analysis of comparable EU-Member States legislation and related case law
...
Chapter 5 Analysis of potential analogy bearing international law treaties on civil aviation, nuclear safety and environmental liability
...
Chapter 6 Analysis of legal practices by industries exposed to analogous risks and by their insurers
...
Chapter 7 The US SAFETY Act
...
Chapter 8Conclusions and policy options
...
List of References
Annex I: Common format for analysis
Annex II: Overview of stakeholder participants
Annex III: Country reports (in separate file)
| Annex III
2 England & Wales
France
Germany
The Netherlands
Poland
Spain
Sweden
Author (Corp. Body): METRO | ECTIL | Hunton & Williams
Contributer: Europäische Kommission / Generaldirektion Unternehmen und Industrie
Year: 2013
ISBN / ISSN / Kat.Nr: Ref. Ares(2013)3320480 | Ref. Ares(2013)3360201
Language: en
Ressource: Einzelne Berichte, Studien
Keyword: service enterpriseEUlegislationliabilityinnovation capacitynuclear energyair trafficpolice
lawjurisdictionsecurityenvironmental protectioninsurance benefitcivil law
Subject: European Community treaties and agreementsCivil liability
Countries Scheme: Europe. General ResourcesUSA
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
Title: Study on Civil Security R&D; in major third countries (SER3CO) : Final Report, within the Framework Contract of Security
Studies – ENTR/09/050
Abstract
Policy attention to the security industry increased substantially after the terrorist attacks in the U.S. on September 11th, 2001. With an increased demand for security, the global security market grew a tenfold to around €100 billion in 2011. Many studies expect that growth of the worldwide security market will continue to exceed the growth rate of world GDP.In summer 2012 the European Commission launched an action plan for an innovative and competitive security industry to enhance growth and increase employment in the EU’s security industry. Better understanding of the main competitive strengths and weaknesses of the security industries in the EU and in major other countries should facilitate the development of policy measures to generate a business environment that enables the EU security industry to keep its leading position.One of the main problems in the EU security market identified by the Commission is its fragmentation along national and sometimes even regional boundaries. One of the first steps to address this problem the Commission proposes is to set up an EU-wide certification system for airport screening (detection) equipment and for alarm systems 3. Insight in costs and benefits of harmonized certification schemes will provide essential information for establishing such schemes at the EU level....The study has been executed by a team of specialists from the framework consortium partners ECORYS, DECISION and TNO, in collaboration with associated partners FOI (Sweden), HCSS (the Netherlands) and PLANCONSULT (Austria). The latter were invited for their access to sources and contacts in respective countries.[Author vide copyright]
Table of Contents
Executive Summary
1 Scope and objectives of the study
1.1 General Context – Background
1.2 Aims and Objectives of the study
1.3 Approach
1.4 Chapter Outline
2 Comparative overview of the security industry
2.1 Introduction
2.2 Global and European security market overview
2.2.1 General issues related to market size estimates
2.2.2 Security market taxonomy
2.2.3 Global and EU security market estimates
2.3 Overview of third country security markets
2.3.1 USA
2.3.2 Russia
2.3.3 Japan
2.3.4 South Korea
2.3.5 Israel
2.3.6 China
2.3.7 Brazil
2.4 Competitive position of the airport screening and alarm systems industries
2.4.1 Introduction
2.4.2 Overview of the airport screening sector
2.4.3 Overview of the intruder and fire alarms sector
2.5 Summary and conclusions
2.5.1 Competitive position of selected countries
2.5.2 Market attractiveness of selected countries
3 Alarm systems and airport screening equipment: certification and conformity assessment
3.1 Comparative overview of certification schemes around the world
3.1.1 Alarm systems
3.1.2 Airport screening equipment
3.2 EU Certification and conformity assessment – CBA alarm systems
3.2.1 Introduction
3.2.2 Baseline
3.2.3 Quantifying the baseline
3.2.4 Policy options
3.3 EU Certification and conformity assessment – CBA airport screening equipment
3.3.1 Baseline scenario
3.3.2 Quantifying the baseline
3.3.3 Policy options
4 Security R&D; programmes
4.1 Introduction
4.2General context: overall R&D; landscape and security environment
4.2.1 Security environment
4.2.2 National innovation system
4.3 Security R&D;
4.3.1 Expenditures
4.3.2 Main actors
4.3.3 Thematic priorities
4.4 Lessons from the security R&D; in major third countries and recommendations for the EU
Author (Corp. Body): Ecorys
Contributer: DECISION | TNO | Europäische Kommission / Generaldirektion Unternehmen und Industrie
Year: 2013
ISBN / ISSN / Kat.Nr: FU98407
Language: en
Ressource: Einzelne Berichte, Studien
Keyword: defense mechanismBrazilChinaserviceEUendangermentindustrial sectorIsrael
Japanair trafficsecuritysecurity policySouth KoreaterrorismenterpriseUnited States of Americacompetition
Subject: European Community treaties and agreementsVarious information networks and systems
Countries Scheme: Europe. General ResourcesUSABrazilIsraelChinaJapan
Korea (South)
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
Title: FP7 Security Advisory Group Annual Summary : June 2011 – June 2012
Table of Contents
1. Introduction
2. The SecAG Process for 2011/2012
3. Work Programme 2013
4. Reflections on the first four Work Programmes Calls
5. Conclusion
Appendix 1: Enhancing end-user engagement
Appendix 2: Summary of FP7 Security Research Workshops
Author: Sleigh, Andrew
Contributer: Europäische Kommission | FP Security Advisory Group
Year: 2012
Language: en
Ressource: Einzelne Berichte, Studien
Keyword: EUresearchborder protectionindustrial sectorinfrastructureinternetsecuritysecurity policy
enterprise
Subject: European Community law in general
Countries Scheme: Europe. General Resources
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
Title: Evaluation of EU assistance to Turkey in the Field of Health and Safety at Work : Final report
Title (other): FWC COM 2011 Lot 1: Studies and Technical Assistance in all sectors | Évaluation de l’assistance de l’UE à la
Turquie dans le domaine de la santé et la sécurité au travail : Résuméé éxécutif | FWC COM 2011 Lot 1: Études
et assistance technique dans tous les secteurs
Abstract
This evaluation was formulated in the context of the IPA evaluation programme, under the IPA Transition Assistance and Institution Building Component. The evaluation mission was designed to serve three major purposes:To present an overall assessment of the extent to which the Commission’s support has contributed to improve the health and safety of workers in the workplace;To give feedback into the decision-making processes at the EU-level dealing with assistance to Turkey. The evaluation should be a valuable aid for both the implementation of the current OSH Strategy and Indicative Programme, and also for future programming.To provide transferable lessons that might be used by the EC in its co-operation with Turkey and other similar countries.It was not the purpose of the evaluation to analyse the Turkish OSH-System in detail. However, for a better understanding of the evaluation results and the opinions and statements of the interviewees, some context information about the OSH system has been integrated into this report. Neither was it the purpose of the evaluation to explicitly re-evaluate the five EU-Assistance projects. The aim of the section of the evaluation dealing with EU-Assistance projects was to identify common characteristics of these projects, so as to present “lessons learned and give overall recommendations for the next phase of the EU-Assistance.”[Author vide copyright]
Table of Contents
Executive Summary
EVALUATION PURPOSE
METHODOLOGICAL APPROACH
EU-ASSISTANCE PROJECTS ON “HEALTH AND SAFETY AT WORK” IN TURKEY WITHIN THE ENLARGEMENT ENVIRONMENT
BACKGROUND OF OSH IN TURKEY
RELEVANCE AND IMPACT OF THE PROJECTS
EFFECTIVENESS
EFFICIENCY
COHERENCE
SUSTAINABILITY
EU VALUE ADDED
LESSONS AND RECOMMENDATIONS: HOW SHOULD PROJECTS BE CONDUCTED?
LESSONS AND RECOMMENDATIONS: WHO SHOULD DO WHAT? - ACTORS IN FUTURE PROJECTS
LESSONS AND RECOMMENDATIONS: WHAT SHOULD BE DONE?
1. EVALUATION - CONTEXT AND OBJECTIVES
1.1OBJECTIVE1.3 CONTEXT AND BACKGROUND
1.4 PURPOSE AND SCOPE OF THE EVALUATION
1.5 BENEFICIARIES AND STAKEHOLDERS
2. METHODOLOGY AND STRUCTURE OF THIS REPORT2.2 PERSONAL INTERVIEWS
2.3 STRUCTURE OF THIS REPORT
2.4 FINAL ACTIVITY REPORT AND MEETING SUMMARIES
3. OSH SITUATION IN TURKEY
3.1 BASIC ASSESSMENT OF THE OSH SITUATION IN TURKEY
3.2 LEGISLATION
3.3 LABOUR INSPECTION BOARD
3.4 QUANTITATIVE INDICATORS
3.5 SELECTED RESULTS FROM THE EWCS 2010
3.6 RATIFICATION OF ILO CONVENTIONS
3.7 CRITICS FROM SOCIAL PARTNERS
4. FINDINGS RELATED TO THE OVERARCHING EVALUATION QUESTIONS
4.1 OVERVIEW OF PROJECT EXPECTATIONS AND RESULTS
4.2 RELEVANCE
4.3 EFFECTIVENESS
4.4 EFFICIENCY
4.5 IMPACT
4.6 COHERENCE
4.7 SUSTAINABILITY
4.8 EU VALUE ADDED
5. FINDINGS RELATED TO THE DETAILED EVALUATION QUESTIONS
6. LESSONS LEARNED AND RECOMMENDATIONS ON FUTURE EU-ASSISTANCE
6.1 HOW SHOULD PROJECTS BE DONE? - PROJECT PREPARATION MANAGEMENT AND MONITORING
6.2 WHO SHOULD DO WHAT? - ACTORS OF FUTURE PROJECTS
6.3 WHAT SHOULD BE DONE – RECOMMENDATIONS FROMINTERVIEWEES AND EVALUATORS
7. REFERENCES
Author: Lißner, Lothar ; 121101541 | Hekimoglu, Seckin
Contributer: Business and Strategies Europe Consortium | Europäische Kommission / Generaldirektion Internationale Zusammenarbeit und Entwicklung | Europäische Kommission / Directorate General for Neighbourhood and Enlargement Negotiations
Year: 2015
ISBN / ISSN / Kat.Nr: EUROPEAID/129783/C/SER/multi | Request No 2014/352216 – Version 2 | Demande de service N ° 2014/352216 – Version 2
Language: en | fr
Ressource: Einzelne Berichte, Studien
Keyword: jobevaluationdevelopment aid policyEUEU expansionmedical welfare servicessecurityTurkey
Subject: Aid programmesEuropean Community external relationsOccupational safetyMedical care. Health control
Countries Scheme: Europe. General ResourcesTurkey
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
Title: External Evaluation of the Instrument for Nuclear Safety Cooperation : (2014 – mid 2017) ; Final Report – Vol. I
Title (other): External Evaluation of the Instrument for Nuclear Safety Cooperation : (2014 – mid 2017) ; Final Report – Vol. II |
Evaluation of the Instrument for Nuclear Safety Cooperation : Final Report ; Executive Summary | External Evaluation of
the Instrument for Nuclear Safety Cooperation : Short Summary
Abstract
The objective of the mid-term review evaluation is to provide an external assessment of the Instrument for Nuclear Safety Cooperation over the period 2014-2017, contributing to lesson-learning and accountability; the focus of the evaluation is on the Instrument, and on whether it is fit for purpose and still a valid basis for the Commission’s undertaking of its activities in a changing context.[Author vide copyright]
Table of Contents
Executive Summary
1 Introduction and evaluation goals
2 Background, approach and evaluation questions
2.1 Background
2.2 The Evaluation Questions
2.3 The evaluation process
2.4 Structure of the Evaluation Report
2.5 Challenges and methodology
2.6 Implementation State of Play
3 Responses to the evaluation questions
3.1 EQ 1 on relevance
3.2 EQ 2 on effectiveness, impact and sustainability
3.3 EQ 3 on efficiency
3.1 EQ 4 on added value
3.2 EQ 5 on coherence, consistency, complementarity and synergies
3.3 EQ 6 on leverage
4 Conclusions and Recommendations
List of figures
Figure 1: Number (Horizontal axis) and age groups age male/female trainees (Vertical axis)
Figure 2: Resource allocation INSC-II
List of boxes
Box 1. INSC need assessment in Ukraine
Box 2. Financing Agreement
Box 3 Statements on INSC Added Value
Box 4. Blending and nuclear safety cooperation
| VOLUME II: ANNEXES
Annex 1: Instrument Intervention logic
Annex 2: Evaluation framework and finalindicator list
Annex 3: Overview of the instrument
Annex 4: Key methodological elements
Annex 5: CIR Assessment
Annex 6: Case study
Annex 7: ROM comparative analysis
Annex 8: Evaluation matrix
Annex 9: Internal working document for analysis of activities and results
Annex 10: Illustrative material for EQ
Annex 11: Consultation Process following the publication of the draft final report
Annex 12: Consultation strategy
Author (Corp. Body): GDSI Limited
Contributer: Europäische Kommission / Generaldirektion Internationale Zusammenarbeit und Entwicklung | Altair Asesores S.L. | A.R.S. Progetti S.P.A. | EEO Group | Euro Consultants | Pohl Consulting & Associates
Year: 2017
ISBN / ISSN / Kat.Nr: FWC COM 2015 | EuropeAid/137211/DH/SER/Multi | Specific Contract No° 2016/376002
Language: en
Ressource: Einzelne Berichte, Studien
Keyword: evaluationdevelopment aid policyEUnuclear energycooperationsecurity
Subject: Aid programmesEuropean Community funds and financial instruments. EIBEuropean Community external relationsNuclear industry. Nuclear safety
Countries Scheme: Europe. General Resources
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
Title: Connectivity Agenda : Co-financing of Investment Projects in the Western Balkans 2017
Abstract
Connectivity AgendaImproving connectivity within the Western Balkans, as well as between the Western Balkans and the European Union, is a key factor for growth and jobs and will bring clear benefits for the region's economies and citizens. The Western Balkans six (WB6) has made the connectivity agenda one of ist highest priorities, with a special emphasis on the preparation and financing of concrete regional infrastructure investment projects, but also on the implementation of technical standards and reform measures such as aligning/simplifying border crossing procedures, railway reforms, information systems, road safety and maintenance schemes, unbundling and third party access.The National Investment Committees (NICs) are responsible fpr definingand managing the prioritised Single ProjectPipelines,and serve as a basisfpr programming ofall available financing sources (including national and other donors). The European Commission will, via the Western Balkans Investment Framework (WBIF), co-finance mature energy projects from the PECIs (Projects of the Energy Community Interest) and the PMIs (Projects of Mutual Interest) as well as mature transport projects from the TEN-T (Trans-European Transport) Core Network, together with loans from Financial Institutions.[Author vide copyright]
Author (Corp. Body): Europäische Kommission / Directorate General for Neighbourhood and Enlargement Negotiations
Contributer: Western Balkans Investment Framework
Year: 2017
Language: en
Ressource: Einzelne Berichte, Studien
Keyword: energy policyinfrastructural developmentEUfinancial assistanceinformation systemregional developmentrail trafficsecurity
road traffictransportation policynetworking
Subject: Aid programmesEuropean Community external relationsEconomic development. Economic growthTransport infrastructure
Countries Scheme: Europe. General ResourcesSoutheastern Europe, Balkan peninsula. General Resources
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
Title: Evaluation of the EU’s Cooperation with the Eastern Africa, Southern Africa and Indian Ocean region (2008 - 2015) :
Final Report ; Volume I – Main Report
Title (other): Evaluation of the EU’s Cooperation with the Eastern Africa, Southern Africa and Indian Ocean region (2008 - 2015) :
Final Report ; Volume I I – Annexes | Evaluation of EU Cooperation with the Eastern and Southern Africa and Indian
Ocean Regions 2008 - 2015 : Summary | Evaluation of EU Cooperation with the Eastern and Southern Africa and Indian Ocean
Regions 2008 - 2015 : Résumé | "Fiche Contradictoire" : Evaluation of EU Cooperatin with the Eastern and Southern
Africa and Indian Ocean Regions 2008-2015
Abstract
This evaluation of the EU’s cooperation with the Eastern Africa, Southern Africa and the Indian Ocean region (EA-SA-IO) aims to: - Provide an overall and independent assessmentof the past and current cooperation. - Identify lessons learned and make recommendations to inform current and future cooperation strategy and delivery.The context and scope of the evaluation includes EU support through the EDF 10 and 11 Regional Indicative Programmes (RIPs) during 2008-2015, taking into account the Economic Partnership Agreements (EPAs), the cooperation framework and other official commitments. Geographically, the scope is the five EA-SA-IO Duly Mandated Regional Organisations (DMROs) (COMESA, EAC, IGAD, IOC, and SADC), and their 25 Member States eligible for EDF support. Total EU funding allocated through the RIPs exceeds € 2.6 billion.[Author vide copyright]
Table of Contents
LIST OF ACRONYMS AND ABBREVIATIONS
EXECUTIVE SUMMARY RÉSUMÉ
1. INTRODUCTION
1.1 OBJECTIVES AND SCOPE
1.2 STRUCTURE OF THE DRAFT FINAL REPORT
2. CONTEXT
3. OUTLINE OF THE METHODOLOGICAL APPROACH
3.1 OVERALL APPROACH AND PROCESS
4. ANSWERS TO THE EVALUATION QUESTIONS
EQ 1: STRATEGIC RELEVANCE
EQ 2 REGIONAL ECONOMIC INTEGRATION
EQ 3 REGIONAL INFRASTRUCTURE: PROGRESS ON REGIONAL INTERCONNECTIVITY
EQ 4 REGIONAL PEACE, SECURITY AND STABILITY
EQ 5 REGIONAL NATURAL RESOURCE MANAGEMENT
EQ 6 COHERENCE, COMPLEMENTARITY AND COORDINATION
EQ 7 EFFICIENCY
EQ 8 REGIONAL INTEGRATION PROSPECTS
5. CONCLUSIONS AND RECOMMENDATIONS
5.1 CONCLUSIONS
5.2 RECOMMENDATIONS
5.3 SECTOR-SPECIFIC ACTIONS
APPENDIX A: EVALUATION MATRIX
APPENDIX B BACKGROUND AND CONTEXT
1. CHALLENGING CONTEXT
2. THE MANDATES AND PRIORITIES OF THE DMROS
3. EU PROGRAMMING IN EA-SA-IO REGION: 2008 TO PRESENT
4. FINANCIAL COMMITMENT BY DMRO MEMBER STATES
APPENDIX C. CASE STUDIES
CASE STUDY 1: RISM
CASE STUDY 2: TRANSPORT CORRIDOR APPROACH TO TRADE FACILITATION IN EAST AFRICA
CASE STUDY 3: THE EU’S REGIONAL ELECTORAL COOPERATION
CASE STUDY 4: JOINT REGIONAL FISHERIES MONITORING, CONTROL AND SURVEILLANCE
List of tables
List of figures
ANNEXES IN VOLUME II
ANNEX 1: TERMS OF REFERENCE
ANNEX 2: INVENTORY
ANNEX 3: METHODOLOGY
ANNEX 4: ANSWERS TO THE EQS
ANNEX 5: SURVEY QUESTIONNAIRE
ANNEX 6: SURVEY RESULTS
ANNEX 7: LIST OF PERSONS MET
ANNEX 8: BIBLIOGRAPHY
Author (Corp. Body): Aide a? la De?cision Economique
Contributer: Europäische Kommission / Generaldirektion Internationale Zusammenarbeit und Entwicklung | PEM Consult | Institut de Recherches dApplications des Me?thodes de De?veloppement
Year: 2017
ISBN / ISSN / Kat.Nr: Contract No COM 2015/Lot 1 N° 2016/373852 | Ref. Ares(2018)3572472
Language: en | fr
Ressource: Einzelne Berichte, Studien
Keyword: evaluationdevelopment aidEUfinancial assistancepeaceIndian Oceaninfrastructurecooperation
East AfricaresourcessecuritystabilitySouthern Africapromotion of economic development
Subject: Aid programmesEuropean Community external relations
Countries Scheme: Europe. General ResourcesEastern Africa. General ResourcesSouthern Africa. General Resources
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
Title: Screening report Serbia : Chapter 12 – Food safety, veterinary and phytosanitary policy
Author (Corp. Body): Europäische Kommission
Publisher: Europäische Kommission / Directorate General for Neighbourhood and Enlargement Negotiations
Year: 2016
ISBN / ISSN / Kat.Nr: MD 188/16
Language: en
Ressource: Einzelne Berichte, Studien
Keyword: EUjoining of the European Uniongroceriesfoodplant preservationSerbiasecurityanimal
consumer protection
Subject: European Community external relationsPlant production. Plant productsAnimal productsFishery products. Aquatic fauna. Fishery productionFeeding. Food
Countries Scheme: Serbia
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
1 | 2 | 3
« Previous
Next »
Copyright (C) 2003-2019 European Documentation Centres / Update: 09.10.2019