Search for Institutions

51 entries found on 3 pages. starting on record 1 ending on 20

Sort by: Title, Year, Author (Corp. Body),

1 | 2 | 3
« Previous
Next »
Title: Success Stories from the Migration and Home Affairs Funds : Solidarity and Management of Migration flows (2007-2013)
Table of Contents
ERF (European Refugee fund)
Austria...
EIF (European Integration Fund)
Austria...
RE (Return fund)
Austria...
EBF (European Borders Fund
Austria...
Author (Corp. Body): Europäische Kommission / Generaldirektion Migration und Inneres
Publisher: Amt für Amtliche Veröffentlichungen, Luxemburg
Year: 2016
ISBN / ISSN / Kat.Nr: 978-92-79-52093-8 | DR-02-15-869-EN-N
Language: en
Ressource: Einzelne Berichte, Studien
Keyword: EUfundingpolicy on refugeesborder regionintegration policymigrationmigration policyproject
Subject: European Community funds and other financial instrumentsMigration
Countries Scheme: Europe. General Resources
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
Title: Study on paving the way for future policy initiatives in the field of fight against organised crime: the effectiveness
of specific criminal law measures targeting organised crime : Final report
Abstract
Organised crime poses a threat to the security and freedom of European citizens and impacts the lives of people worldwide. Recognising the severity of the problem and the need for coordinated action, the EU has initiated a number of measures to encourage closer cooperation between Member States and the adoption of common legal, judicial and investigative frameworks to address organised crime. [Author vide copyright]
Table of Contents
PREFACE
EXECUTIVE SUMMARY
ACKNOWLEDGEMENTS
PART 1: INTRODUCTION AND BACKGROUND
1. INTRODUCTION TO THE STUDY
2.BACKGROUND TO THE STUDY – EUROPEAN AND INTERNATIONAL LEGAL FRAMEWORKS IN THE FIGHT AGAINST ORGANISED CRIME
2.1. ...
3. METHODOLOGY
3.1. ...
PART 2: NATIONAL CRIMINAL LAW TOOLS USED IN THE FIGHT AGAINST ORGANISED CRIME
4. MAPPING AND TRANSPOSITION ASSESSMENT OF MS LEGISLATION WITH REFERENCE TO FRAMEWORK DECISION 2008/841/JHA
4.1. ...
5. FURTHER/ALTERNATIVE CRIMINAL LAW TOOLS TO FIGHT ORGANISED CRIME
5.1. ...
6. IMPLEMENTATION OF LAWS RELATING TO PARTICIPATION IN A CRIMINAL ORGANISATION
6.1. ...
PART 3: LEGAL AND INVESTIGATIVE TOOLS
7. LEGAL AND INVESTIGATIVE TOOLS
7.1. ...
PART 4: NATIONAL SPECIALISED JUDICIAL AND LAW ENFORCEMENT AGENCIES INVOLVED IN THE FIGHT AGAINST ORGANISED CRIME
8. AN OVERVIEW OF NATIONAL SPECIALISED JUDICIAL AND LAW ENFORCEMENT AGENCIES, PROMISING PRACTICES AND CHALLENGES
8.1. ...
PART 5: CASE STUDIES
9. THE ITALIAN CASE STUDY
9.1. ...
10. UK CASE STUDY
10.1. ...
PART 6: CONCLUSIONS
11. CONCLUSIONS
11.1. ...
REFERENCES
APPENDIX A: LEGAL SOURCES
APPENDIX B: MAIN NATIONAL SPECIALIST AGENCIES OPERATING IN THE FIELD OF ORGANISED CRIME
APPENDIX C: INTERVIEWEES FOR UK CASE STUDY
Author: Di Nicola, Andrea ; 106687574X | Gunev, Filip ; 1057018023 | Levi, Michael ; 171516753
Contributer: Europäische Kommission / Generaldirektion Migration und Inneres | Rand Europe, Cambridge | ecrime group | Centre for the Study of Democracy
Publisher: Amt für Amtliche Veröffentlichungen, Luxemburg
Year: 2015
ISBN / ISSN / Kat.Nr: 978-92-79-44630-6 | HR-06-14-242-EN-N
Language: en
Ressource: Einzelne Berichte, Studien
Keyword: evaluationEUcase studylaw enforcementlegislationGreat BritainItalyorganizations
organized crimelegal usage
Subject: European Community treaties and agreementsCriminal law. Penal sanctions. Penal institutions
Countries Scheme: Europe. General ResourcesItalyUnited Kingdom
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
Title: Indicators of Immigrant Integration 2015 : Settling in
Abstract
This publication presents the first broad international comparison across all EU and OECD countries of the outcomes for immigrants and their children. It is the fruit of a joint co-operation between the European Commission (DG Migration and Home Affairs) and the OECD’s International Migration Division, in the perspective of a regular monitoring of comparable indicators of integration across EU and OECD countries. This report has been produced with the financial assistance of the European Union. This publication builds on a first set of indicators presented for OECD countries in the 2012 OECD Publication “Settling In” and draws on the data and information gathered through its work on integration issues carried out by the OECD’s International Migration Division. It also benefited from data provided by Eurostat and specific data requests to EU and OECD countries. This publication would not have been possible without the support of the Delegates to the OECD Working Party on Migration who provided valuable support in the data collection for this report. [Author vide copyright]
Table of Contents
Editorial
Executive summary
Chapter 1. Introduction and overview
1.1. Information on the integration of immigrants and their children is key for a proper policy debate
...
Chapter 2. Socio-demographic characteristics of immigrant populations
Key findings
2.1. Size and share living in densely populated areas
...Chapter 3. Defining characteristics of immigrant populations
Key findings
3.1. Composition of new immigration flows by category
...
Chapter 4. Characteristics of immigrant households
...
4.1. Definition and size of immigrant households
Chapter 5. Labour market outcomes of immigrants
...
Chapter 6. Quality of immigrants’ jobs
...
6.1. Types of contracts
...
Chapter 7. Cognitive skills and training of immigrant adults
...
Chapter 8. Income of immigrant households
8.1 Househould income distribution
...
Chapter 9. Immigrants and housing
9.1. Housing tenure
...
Chapter 10. Immigrants’ health status and their health care
10.1. Self-reported health status
...
Chapter 11. Civic engagement of immigrants
11.1. Acquisition of nationality
...

Chapter 12. Social cohesion and immigrants
12.1. Perceived discrimination
...
Chapter 13. Young people with a migrant background
13.1. Immigrant and native-born immigrant offspring populations in the 15-34 age group
...
Chapter 14. Third-country nationals in the European Union
14.1. Size and composition by age and gender
...
Glossary
Author (Corp. Body): Europäische Kommission / Generaldirektion Migration und Inneres | OECD / International Migration Division
Publisher: Amt für Amtliche Veröffentlichungen, Luxemburg | OECD Publishing
Year: 2015
ISBN / ISSN / Kat.Nr: 978-92-64-23402-4 | 978-92-79-46651-9 | R-04-15-218-EN-N
Language: en
Ressource: Einzelne Berichte, Studien
Keyword: labor markettrainingemploymentcitizens' involvementdiscriminationthird countriesincomeEU
health carehousehold sizeintegrationadolescentchildmigrantmigrationOECD countrysocial policy
Subject: European Community law in generalSocial services and medico-social assistanceMigration
Countries Scheme: Europe. General Resources
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
Title: Study on the implementation of the European Information Exchange Model (EIXM) for strengthening law enforcement
cooperation : Final Report
Abstract
Smooth and secure cross-border information exchanges between law enforcement authorities are essential in order to ensure a high level of security in the EU and tackle serious and organised crime, as well as other offences that require cross-border collaboration. In order to ensure timely access to accurate and up-to-date data for law enforcement authorities, a considerable number of EU instruments and systems have been put in place in recent years, which are also supplemented by international and bilateral arrangements. The purpose of the study was to provide a follow up to the Commission’s 2012 Communication on the European Information Exchange Model (EIXM Communication), to survey and assess activities carried out in Member States in this context as well as point to possible ways of further improvement. [Author vide copyright]
Table of Contents
Executive summary
1 Introduction
2 Scope and methodology of the study
2.1 Scope of the study
2.2 Our methodology
3 Context
3.1 EIXM – the rationale
3.2 EIXM – the legal and policy underpinning
3.3 EIXM – the legal instruments
3.4 EIXM – the processes and practical aspects of information exchange
4 The implementation of the European Information Exchange Model (EIXM)
4.1 Implementation of the legal instruments
4.2 Processes and practical aspects of information exchange
4.3 Horizontal challenges of EIXM
Annexes
Annex 1: Analytical Framework
Annex 2: Interview guides
Annex 3: Glossary of terms
3List of figuresFigure 2: The different layers of a SPOC
List of tables
Table 1: Instruments of information management currently in place
Table 2: Main channels for the cross -border exchange of law enforcement information
Table 3: Evolution of Prüm implementation (2012- 2014)
Table 4: Application of the SPOC Guidelines’ criteria in the Member States
Author: Doherty, Richard | Vandresse, Benoît | Kamarás, Éva
Contributer: Europäische Kommission / Generaldirektion Migration und Inneres | Deloitte
Year: 2015
Language: en
Ressource: Einzelne Berichte, Studien
Keyword: data exchangeEUcross border cooperationinformation exchangeinformation systemjudiciarycorruptioncriminality
organized crimepolice
Subject: European Community treaties and agreementsPublic administration. Executive powerAdministration of justiceVarious information networks and systems
Countries Scheme: Europe. General Resources
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
Title: The European Agenda on Migration : Glossary, facts and figures
Table of Contents
Irregular migration
Comparison of irregular border crossings by route between Jan.-Dec. 2013 and Jan.-Dec. 2014
EU Agencies supporting Member States’ efforts in the area of migration?
EU rules on returning irregularly staying migrants
Return decisions against effected returns for main countries of citizenship of the irregular migrants
The Action Plan on Smuggling
Readmission Agreements
17 Readmission Agreements currently in force
The principle of non-refoulement
The difference between smuggling and trafficking
How does the EU tackle trafficking in human beings?
Save lives and secure the external borders
The “Hotspots” System
The Smart Borders Package
EUROSUR
Common Security and Defence Policy operations
Asylum and protection
The current EU legal framework on asylum
Total number of asylum seekers in the EU
Number of asylum applications per Member State
What does relocation mean? How does it work?
Distribution of asylum seekers among the ten EU countries receiving the most applications (2014)
The emergency response system under Art. 78.3 of the Treaty
What is resettlement? How does it work?
Resettled persons during the period 2008 - 2014
Regional Development and Protection Programmes
Legal migration
How does the EU attract non-EU workers?
Blue Cards issued by Member States
Residence permits issued by Member States
Impact of migration on development
Visa requirements for entering into the EU?
Top applicant countries in 2014
Mobility Partnerships
8 Mobility Partnerships signed
Author (Corp. Body): Europäische Kommission / Generaldirektion Migration und Inneres
Year: 2015
Language: en
Ressource: Wikis, Glossare und spezielle Nachschlagewerke
Keyword: person seeking asylumEUillegal immigrationmigrationpartnershipregional developmentresettlement
Subject: European Community law in generalMigration
Countries Scheme: Europe. General Resources
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
Title: Der Schengen-Raum : Europa ohne Grenzen
Title (other): The Schengen area : Europe without borders | L’espace Schengen : Une Europe sans frontières
Author (Corp. Body): Europäische Kommission / Generaldirektion Migration und Inneres
Publisher: Amt für Amtliche Veröffentlichungen, Luxemburg
Year: 2015
ISBN / ISSN / Kat.Nr: 978-92-79-46111-8 | DR-02-15-167-DE-N | 978-92-79-46108-8 | 978-92-79-46095-1
Language: en | de | fr
Ressource: Sonstige Nachschlagewerke
Keyword: EUfreedom of movementborder protectiontourist traffic
Subject: FrontiersEuropean Community law in general
Countries Scheme: Europe. General Resources
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
Title: ESBG : Study on the feasibility of the creation of a European System of Border Guards to control the external borders of
the Union ; Final report
Abstract
The final report presents the results of the study on the feasibility of the creation of a European System of Border Guards to control the external borders of the Union carried out by Unisys for the Directorate General Home Affairs of the European Commission. The purpose of the study was to identify three models of what a European System of Border Guards could be composed of, when assessing the expert views in EU Member States, Schengen Associated Member States and at the EU level. After a thorough evaluation of the existing challenges and future opportunities, different options were proposed for improved cooperation at the external borders of the EU, including the increased role of the Frontex Agency. [Author vide copyright]
Table of Contents
1 Executive summary
2 Introduction
2.1 Study context and objective
2.2 Methodology
2.2.1 Desktop research
2.2.2 Use of the questionnaires
2.2.3 Visits and interviews
2.2.4 Consolidation and analysis
2.3 Contextual issues
3 Progress made
3.1 Existing instruments
3.1.1 IBM Strategy
3.1.2 Revised Schengen Borders Code
3.1.3 Frontex mandate
3.1.4 Eurosur
3.1.5 New Schengen Evaluation Mechanism
3.2 Measures under way
3.2.1 Smart Border package implementation
3.2.2 Financial framework for border financing 2014-2020
4 Opportunities identified with regard to ESBG
4.1 Member States’ views
4.2 Frontex feedback
4.3 European Parliament’s position
5 Recommendations
5.1 Why a phased approach?
5.2 Proposed Models
5.2.1 Model 1 –Optimal use of existing instruments
5.2.2 Model 2 – Shared responsibility
5.2.3 Model 3 - Full integration at EU level
5.3 Comparison of the three models
5.4 Cost and benefits analysis
5.4.1 General considerations
5.4.2 Procurement of equipment and services
5.4.3 Centralisation of structures and activities
5.5 Roadmap for Implementation
6 Annexes
...
Table of Figures
...
Table of Tables
...
Author: van de Poele, Marie | Cojanu, Gabriela | Robrock, Anne
Contributer: Europäische Kommission / Generaldirektion Migration und Inneres | Unisys
Year: 2014
Language: en
Ressource: Einzelne Berichte, Studien
Keyword: evaluationEUborder protectionmodel construction
Subject: FrontiersEuropean Community law in general
Countries Scheme: Europe. General Resources
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
Title: Security in 2020 : Meeting the challenge
Table of Contents
Welcome letter by Dimitris Avramopoulos
Meeting Europe’s diverse societal challenges
Who we are, what we do: how Security Research functions
Supporting the EU’s home affairs goals
Making Europe’s critical infrastructure networks stronger
Using Security Research to improve the control of Europe’s borders
Reinforcing crisis management & disaster response
Boosting the EU’s competitiveness
Security Research support for the EU’s external policies
Security Research: embedded in ethics
Securing the Future
Author (Corp. Body): Europäische Kommission / Generaldirektion Migration und Inneres
Publisher: Amt für Amtliche Veröffentlichungen, Luxemburg
Year: 2014
ISBN / ISSN / Kat.Nr: 978-92-79-43761-8 | NB-05-14-085-EN-N
Language: en
Ressource: Einzelne Berichte, Studien
Keyword: EUborder protectioninfrastructuredisaster controlcrisis management (psych.)security policy
Subject: Peace. Wars. TerrorismEuropean Community external relationsEuropean Community law in general
Countries Scheme: Europe. General Resources
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
Title: Updated Study on Corruption in the Healthcare Sector : Final Report
Abstract
In 2012, Ecorys conducted an initial study on corruption in the healthcare sector (SCH1). The purpose of the current study on corruption in the healthcare sector was two-fold: (i) to analyse and report on relevant developments since the publication of SCH1 and (ii) to provide an in-depth analysis of selected issues: privileged access to medical services, improper marketing and potential risks involving double practice.The study covered all EU-28 Member States, with specific attention focused on: Greece, Croatia, Hungary, Lithuania, Poland, and Romania. The analysis is based on desk research, an online survey sent to stakeholders across the EU, thematic interviews with various organisations in the field of (EU) healthcare, and fact-finding missions, providing more detailed analysis and examples with regard to the six selected countries.The study concluded that: Bribery in medical service delivery remains one of the main challenges, especially in many Eastern and Southern European Member States. Corruption related to granting privileged access to healthcare or potential risks involving double practice are not isolated to Member States with a high perception of corruption (in healthcare).Transparent procedures are key in addressing corruption in procurement processes.Attempts to address improper marketing increase at both EU and national level.[Author vide copyright]
Table of Contents
Executive Summary
1. INTRODUCTION
1.1. Background of the study
1.2. Scope and objectives of the study
1.3. General approach
1.4. Outline of the Final Report
2. METHODOLOGICAL APPROACH
2.1. Survey
2.2. Thematic interviews
2.3. Fact finding missions
2.4. Desk research
3. COUNTRY STUDIES
Introduction
3.1. Greece
3.2. Croatia
3.3. Lithuania
3.4. Hungary
3.5. Poland
3.6. Romania
4. UPDATE SHC1 AND THEMATIC DEEPENING
4.1. Introduction
4.2. Update SCH1
4.3. Thematic deepening
5. CONCLUSIONS
5.1. Revisiting the general conclusions of SCH1
5.2. Relevant developments since SCH1
Annex I: Interview guide
Annex II: Overview of survey stakeholders
Annex III: Survey design
Annex IV: Corruption indicators (Special Eurobarometer 397)
Author (Corp. Body): Ecorys
Contributer: Europäische Kommission / Generaldirektion Migration und Inneres
Publisher: Europäische Kommission / Amt für Veröffentlichungen
Year: 2017
ISBN / ISSN / Kat.Nr: 978-92-79-73245-4 | DR-01-17-966-EN-N
Language: en
Ressource: Einzelne Berichte, Studien
Keyword: EUhealth care delivery systemGreececorruptionCroatiaLithuaniamedical carePoland
RomaniaHungary
Subject: European Community law in generalMedical care. Health control
Countries Scheme: Europe. General ResourcesLithuaniaPolandHungaryCroatiaRomania
Greece
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
Title: Study on alternatives to coercive sanctions as response to drug law offences and drug-related crimes : Final report
Title (other): Study on alternatives to coercive sanctions as response to drug law offences and drug-related crimes : Appendix A ;
Questionnaire to be completed by Member State experts
Abstract
The EU Action Plan on Drugs 2013-2016 requires EU member states to ‘provide, where appropriate and in accordance with their legal frameworks, alternatives to coercive sanctions (such as education, treatment, rehabilitation, aftercare and social integration) for drug using offenders’. The EU Action Plan on Drugs 2013-2016 also requests increased monitoring, implementation and evaluation of alternatives to coercive sanctions for drug-using offenders.This document reports findings from a ‘study on alternatives to coercive sanctions as response to drug law offences and drug-related crimes’, which has been conducted by RAND Europe for the European Commission, DG Migration and Home Affairs. This document includes:Introduction to the study (Chapter 1), an overview of the approach to data collection (Chapter 2) and an explanation of how alternative sanctions were selected for inclusion in this report (Chapter 3).Findings about the alternatives to coercive sanctions that are available across EU member states (Chapter 4). Findings about the statistics available about the use of alternatives to coercive sanctions with the member states (Chapter 5) and about the reasons why alternatives are used in practice, or not (Chapter 6).Findings from the review and assessment of international research on the effectiveness of alternatives to coercive sanctions (Chapter 7).Conclusions and suggestions for further action (Chapter 8).[Author vide copyright]
Table of Contents
PREFACE
SUMMARY
ACKNOWLEDGEMENTS
1. INTRODUCTION
1.1. Purpose of the study
1.2. Scope of the study
1.3. Other recent work in this field
2. OVERVIEW OF STUDY APPROACH
2.1. Overview of study approach
2.2. Limitations of the study
3. APPLYING THE DEFINITION OF ACS
4. FINDINGS ABOUT ACS AVAILABLE IN MEMBER STATES
4.1. Types of ACS reported
4.2. Treatment as a main component or condition
14.3. Types of treatment available
4.4. Introduction dates of ACS
4.5. Scope of geographic application
4.6. Professionals who offer ACS, professionals delivering ACS and setting in which ACS can be applied
4.7. Who pays for the treatment provided under ACS?
4.8. Type of offences and offenders for which ACS can be used
4.9. Minimum and maximum length of ACS imposed
4.10. What happens when offenders do not comply with the conditions of ACS imposed?
5. STATISTICS ON THE USE OF ACS
5.1. Collecting statistics on ACS
5.2. Overview of ACS for which data were provided
5.3. Case studies on statistics regarding use in practice
6. THEMATIC ANALYSIS OF THE USE OF ACS IN PRACTICE
6.1. Frequency of use of ACS in practice
6.2. Reasons why ACS were and were not used in practice
7. REVIEW OF INTERNATIONAL LITERATURE
7.1. Scope and objective: updating recently-conducted reviews
7.2. Evidence on effectiveness
7.3. Effectiveness of ACS in reducing reoffending
7.4. Effectiveness of ACS in reducing drug use
7.5. Effectiveness of ACS in improving other outcomes
7.6. Effectiveness of drug courts
7.7. Evidence of factors enhancing the effectiveness of ACS
7.8. Limitations and challenges for the evidence base on ACS
| 8. CONCLUSIONS AND SUGGESTIONS FOR FURTHER ACTION
8.1. Conclusions from mapping the types of ACS available
8.2. Conclusions from examining the use of ACS in practice
8.3. Conclusions from the evidence of the effectiveness of the use of ACS
8.4. Implications of this study for possible next steps
References
Appendix A: Questionnaire completed by member state experts
Appendix B: List of ACS reported for this study
Appendix C: Further information about the literature review
Appendix D: Studies identified in literature search
Appendix E: Literature identified by member state experts
Author (Corp. Body): Rand Europe
Contributer: Europäische Kommission / Generaldirektion Migration und Inneres
Publisher: Europäische Kommission / Amt für Veröffentlichungen
Year: 2016
ISBN / ISSN / Kat.Nr: 978-92-79-57756-7 | DR-01-16-352-EN-N
Language: en
Ressource: Einzelne Berichte, Studien
Keyword: drug-related crimedrug policyEUsanctionpenal law
Subject: European Community law in generalCriminal law. Penal sanctions. Penal institutions
Countries Scheme: Europe. General Resources
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
Title: Study on the Temporary Protection Directive : Final report
Title (other): Study on the Temporary Protection Directive : Executive Summary
Abstract
This Final report is the final deliverable of the Study on the Temporary Protection Directive (2001/55/EC), an assignment undertaken by ICF Consulting Services Limited (“ICF”), on behalf of DG Migration and Home Affairs (“the Commission”). The Final Report contains the purpose, scope, design and conduct of the study, presents the analysis carried out and presents conclusions and recommendations. This Final Report is structured as follows: Chapter 2 describes the methodology and work undertaken by the Study Team;Chapter 3 provides an overview of the Temporary Protection mechanism,reviewing its historical context, the Commission’s proposal and negotiations and an explanation of the workings of the mechanism and application to date; Chapter 4 presents strengths and weaknesses of the Temporary Protection Directive TPD);Chapter 5 examines pressures on the EU in the period 2001-2014 (these events are further examined in the case study descriptions in Annex 3) and summarises the reasons for non-implementation of the TPD;Chapter 6 identifies possible changes to the TPD and assessesthese policy options.Chapter 7 includes a comparison between the preferred policy option for revising the TPD and the recently proposed provisional measures and permanent crisis mechanism.[Author vide copyright]
Table of Contents
1 Introduction
2 Methodology
2.1 Objectives of the Study
2.2 Outline of the methodology
2.3 Work undertaken by the Study Team and challenges encountered
3 Background to the Temporary Protection Directive
3.1 What preceded the adoption of the Temporary Protection Directive
3.1.1 National forms of temporary protection preceding the adoption of the TPD
3.1.2 Historical context
3.1.3 Commission proposals and negotiations
3.2 The temporary protection mechanism
3.2.1 Objectives
3.2.2 The mechanism
3.2.3 Status of transposition
3.2.4 Application to date
4 Strengths and weaknesses of the TPD
4.1 Introduction
4.2 A broad definition of mass influx, resulting in flexibility but also obstacles in its application
4.2.1 “Large numbers”
4.2.2 “Arrival (spontaneous or aided) in the community”
4.2.3 Who come from a “specific country or geographical area”
4.2.4 Who are “unable to return to their country of origin”
4.2.5 If there is a “risk” that the asylum system will be unable to process the influx without “adverse effects”
4.3 Cumbersome and lengthy activation procedure influenced by political factors
4.3.1 Are the right actors involved?
4.3.2 The number of steps are high
4.3.3 The content of some of the steps are unclear
4.4 Solidarity principle, based on dual volunteerism
4.4.1 The principle of solidarity
4.4.2 The organisation of redistribution, as laid down in the TPD
4.5 A fair and adequate level of protection of rights, but potentially unattractive to Member States
4.6 In the absence of activation, theobjective to harmonise TP is undermined
5 Pressures on the EU in the period 2001 2014 and reasons for non-implementation
5.1 Pressure on Member States in the period 2001-2014
5.1.1 Pressure due to a significant high and/or sudden increase
5.1.2 Pressure following a gradual increase
5.1.3 Pressure due to strong fluctuations
5.2 Management of the situation
| 5.2.1 Development of alternative measures to deal with situations of pressure
5.2.2 What measures have Member States made use of both at national and EU level in response to the situations of pressure?
5.2.3 Different approaches in handling situations of pressure
5.3 Could the TPD have provided added-value?
5.4 Reasons for the non-implementation of the TPD
6 Policy options and their assessment
6.1 Criteria for the triggering of the mechanism
6.1.1 Reflection on concepts and indicators for measurement
6.1.2 Criteria for the triggering of the mechanism
6.2 Procedure to be followed for triggering the mechanism and its duration
6.3 Rights to be granted to persons being granted temporary protection and obligations of Member States
6.4 The type of solidarity mechanism
7 Continued relevance of the TPD and an amended TPD in comparison with the new proposals for (emergency and permanent crisis) relocation mechanisms
Annexes
Annex 1 National forms of temporary protection
Annex 2 Case Studies
Belgium 2008-2012
Bulgaria 2013-2014
Cyprus
France 2007-2013
Germany 2013-2014
Greece 2006-2008
Hungary 2013-2015
Italy 2011
Malta 2011
Netherlands
Poland
Sweden 2013-2014
Annex 3 Statistics
Annex 4 Hypothetical/future scenarios of mass influx in the EU
| 1 Executive summary – Study on the Temporary Protection Directive
1.1 Aims of the study
1.2 Background and context
1.3 Strengths and weaknesses
1.4 Pressures on the EU in the period 2001 -2014 and the reasons for non-implementation
1.5 Policy options and their assessment
1.6 Continued relevance of the TPD and an amended TPD in comparison with the new (emergency and proposed permanent crisis) relocation mechanisms
Author (Corp. Body): ICF Consulting Services Limited
Contributer: Europäische Kommission / Generaldirektion Migration und Inneres
Publisher: Europäische Kommission / Amt für Veröffentlichungen
Year: 2016
ISBN / ISSN / Kat.Nr: 978-92-79-60666-3 | DR-01-16-702-EN-N | 978-92-79-61581-8 | DR-02-16-925-EN-N
Language: en
Ressource: Einzelne Berichte, Studien
Keyword: policy on asylumEUEuropean Lawrefugeehuman rightsmigrationmigration policyprotection
directiveexpellee
Subject: European Community law in generalHuman rightsMigration
Countries Scheme: Europe. General Resources
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
Title: Horizon 2020 - Societal Challenge 7 : Secure societies – protecting freedom and security of Europe and its citizens ;
Report
Abstract
In accordance with the mandate of the Protection and Security Advisory Group (PASAG), this report aims to identify the scientific, technological and innovation priorities for the Horizon 2020 Societal Challenge 7: Secure societies – protecting freedom and security of Europe and its citizens. The report is based on the results of the PASAG discussions and comments provided by its members.[Author vide copyright]
Author (Corp. Body): Horizon Protection And Security Advisory Group
Contributer: Europäische Kommission / Generaldirektion Migration und Inneres
Year: 2016
Language: en
Ressource: Einzelne Berichte, Studien
Keyword: EUinnovationcooperationoutline conditionsecurity policytechnologyterrorismscience
Subject: Peace. Wars. Terrorism
Countries Scheme: Europe. General Resources
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
Title: Study on the development of statistical data on the European security technological and industrial base : Security
Sector Survey Analysis: Germany
Abstract
This Background Report has been produced as part of the study on “Development of statistical data on the European security technological and industrial base” commissioned by the European Commission within the Framework Contract on Security (ENTR/09/050) between the European Commission and a consortium led by Ecorys Nederland B.V. in collaboration with TNO and DECISION.The Background Report provides an overview of initial findings from a survey of companies active in the (civil) security sector in Germany. It is one of a series of reports covering findings from surveys conducted for: Estonia, France, Italy, Poland, Spain and the United Kingdom. The survey design and subsequent data analysis has been undertaken by Ecorys, while the actual surveying of companies has been conducted by GfK, a specialist market research company. The individual country surveys of companies have been conducted over the period October 2014 to February 2015.To obtain comparable data for Germany, Ecorys has collaborated with the Brandenburg Institute for Society and Security (BIGS) who have conducted a similar survey in 2012 based on a common survey questionnaire design. This survey has been implemented as a follow-up round to previous surveys of companiesactive in the (civil) security sector in Germany undertaken by BIGS.[Author vide copyright]
Table of Contents
Preface
1 Introduction
1.1 General context
1.2 Aim of this report
1.3 Structure of the report
2 Survey overview
2.1 CATI-Survey 2012
2.1.1 Survey population
2.1.2 Coverage and response rate
2.1.3 Survey instrument and method
2.1.4 Field report & Field time
2.1.5 Length of interviews
2.1.6 Data preparation and testing
2.2 Online-Survey 2014
2.2.1 Survey population
2.2.2 Coverage and response rate
2.2.3 Survey instrument and method
2.2.4 Field report
2.2.5 Data preparation and testing
3 Descriptive analysis
3.1 Security ‘threat’ categories
3.2 Areas of economic activity
3.3 Broad segmentation of security products and services
3.4 Cyber security
3.4.1 Cyber security products and services
3.4.2 Cyber/IT business activities
3.5 ‘Other’ security product providers
3.5.1 ‘Other’ security products
3.5.2 ‘Other’ security products business activities
3.6 ‘Other’ security service providers
3.7 Security market by economic sector (end-user)
3.7.1 Overall–all products and services
3.7.2 Breakdown by main broad category of security products and services
3.8 Security market by geographical region
3.8.1 Geographical markets – all products and services
3.8.2 Breakdown by main broad category of security products and services
3.9 Firm structure: employment and turnover
3.9.1 Employment
3.9.2 Turnover
3.10 Growth performance and prospects
3.10.1 Past turnover growth performance
3.10.2 Future turnover growth prospects
3.10.3 Future demand prospects by broad customer group and geographical area
| 3.11 Competitors
3.11.1 Geographical origin of main competitors– all products and services
3.11.2 Future competition prospects by geographical origin of main competitors
4 Aggregate estimates
4.1 Overview of approach
4.2 Method for the estimation of aggregate turnover and employment for the survey sample
4.2.1 Underlying assumptions
4.2.2 Estimation of turnover for non-declaring respondents
4.3 Method for the estimation of aggregate (national) turnover and employment (extrapolation)
4.3.1 Underlying assumptions
4.3.2 Calculation of aggregate (national) turnover and employment
4.4 Variants and sub-groups
4.4.1 Adjustment for possible defence-related turnover and employment (variant)
4.4.2 Estimation of turnover and employment by main broad industry category (sub-groups)
4.5 Size of the security industry: survey estimates and aggregate (national) extrapolation
Annexes
A.1. Product and services segmentation
A.2. Market Segmentation
Author (Corp. Body): Ecorys
Contributer: TNO | Europäische Kommission / Generaldirektion Migration und Inneres | DECISION
Year: 2015
ISBN / ISSN / Kat.Nr: FU98408
Language: en
Ressource: Einzelne Berichte, Studien
Keyword: data securityGermanyserviceEUfire brigadeinternetpolicesecurity
security policyespionagestatisticsenterprise
Subject: European Community law in general
Countries Scheme: Germany. General ResourcesEurope. General Resources
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
Title: Study on the development of statistical data on the European security technological and industrial base : Security
Sector Survey Analysis: Spain
Abstract
This Background Report has been produced as part of the study on “Development of statistical data on the European security technological and industrial base” commissioned by the European Commission within the Framework Contract on Security (ENTR/09/050) between the European Commission and a consortium led by Ecorys Nederland B.V. in collaboration with TNO and DECISION.The Background Report provides an overview of initial findings from a survey of companies active in the (civil) security sector in Germany. It is one of a series of reports covering findings from surveys conducted for: Estonia, France, Italy, Poland, Spain and the United Kingdom. The survey design and subsequent data analysis has been undertaken by Ecorys, while the actual surveying of companies has been conducted by GfK, a specialist market research company. The individual country surveys of companies have been conducted over the period October 2014 to February 2015.To obtain comparable data for Germany, Ecorys has collaborated with the Brandenburg Institute for Society and Security (BIGS) who have conducted a similar survey in 2012 based on a common survey questionnaire design. This survey has been implemented as a follow-up round to previous surveys of companiesactive in the (civil) security sector in Germany undertaken by BIGS.[Author vide copyright]
Table of Contents
Preface
1 Introduction
1.1 General context
1.2 Aim of this report
1.3 Structure of the report
2 Survey overview
2.1 Survey implementation
2.2 Survey population
2.3 Coverage and response rate
2.4 Survey instrument and method
2.5 Field report
2.5.1 Field time
2.5.2 Length of interviews
2.6 Data preparation and testing
3 Descriptive analysis
3.1 Security ‘threat’ categories
3.2 Areas of economic activity
3.3 Broad segmentation of security products and services
3.4 Cyber security
3.4.1 Cyber security products and services
3.4.2 Cyber/IT business activities
3.5 ‘Other’ security product providers
3.5.1 ‘Other’ security products
3.5.2 ‘Other’ security products business activities
3.6 ‘Other’ security service providers
3.6.1 ‘Other’ security services
3.7 Security market by economic sector (end-user)
3.7.1 Overall – all products and services
3.7.2 Breakdown by main broad category of security products and services
3.8 Security market by geographical region
3.8.1 Geographical markets – all products and services
3.8.2 Breakdown by main broad category of security products and services
3.9 Firm structure: employment and turnover
3.9.1 Employment
3.9.2 Turnover
3.10 Growth performance and prospects
3.10.1 Past turnover growth performance
3.10.2 Future turnover growth prospects
3.10.3 Future demand prospects by broad customer group and geographical area
3.11 Competitors
3.11.1 Geographical origin of main competitors – all products and services
3.11.2 Breakdown by main broad category of security products and services
3.11.3 Future competition prospects by geographical origin of main competitors
| 4 Aggregate estimates of the size of the security industry
4.1 Overview of approach
4.2 Method for the estimation of aggregate turnover and employment for the survey sample
4.2.1 Underlying assumptions
4.2.2 Estimation of turnover for non-declaring respondents
4.2.3 Estimation of employment levels for employment - size class ‘1000 or more employees’
4.2.4 Estimation of sample average values of employment and turnover per firm
4.3 Method for the initial estimation of aggregate turnover and employment
4.3.1 Underlying assumptions
4.3.2 Calculation of the initial estimate of the population of security companies
4.3.3 Calculation of initial estimates of aggregate (national) turnover and employment
4.4 Variants and sub-groups
4.4.1 Adjustment for possible defence-related turnover and employment (variant)
4.4.2 Estimation of turnover and employment by main broad industry category (sub-groups)
4.5 Size of the security industry: survey estimates and aggregate (national) extrapolation
4.5.1 Estimates of the population of security companies
4.5.2 Comparison of estimators
Annexes
A.1. Product and services segmentation
A.2. Market Segmentation
Author (Corp. Body): Ecorys
Contributer: TNO | Europäische Kommission / Generaldirektion Migration und Inneres | DECISION
Year: 2015
ISBN / ISSN / Kat.Nr: FU98408
Language: en
Ressource: Einzelne Berichte, Studien
Keyword: data securityserviceEUfire brigadeinternetpolicesecuritysecurity policy
Spainespionagestatisticsenterprise
Subject: European Community law in general
Countries Scheme: Europe. General ResourcesSpain
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
Title: Study on the development of statistical data on the European security technological and industrial base : Security
Sector Survey Analysis: France
Abstract
This Background Report has been produced as part of the study on “Development of statistical data on the European security technological and industrial base” commissioned by the European Commission within the Framework Contract on Security (ENTR/09/050) between the European Commission and a consortium led by Ecorys Nederland B.V. in collaboration with TNO and DECISION.The Background Report provides an overview of initial findings from a survey of companies active in the (civil) security sector in Germany. It is one of a series of reports covering findings from surveys conducted for: Estonia, France, Italy, Poland, Spain and the United Kingdom. The survey design and subsequent data analysis has been undertaken by Ecorys, while the actual surveying of companies has been conducted by GfK, a specialist market research company. The individual country surveys of companies have been conducted over the period October 2014 to February 2015.To obtain comparable data for Germany, Ecorys has collaborated with the Brandenburg Institute for Society and Security (BIGS) who have conducted a similar survey in 2012 based on a common survey questionnaire design. This survey has been implemented as a follow-up round to previous surveys of companiesactive in the (civil) security sector in Germany undertaken by BIGS.[Author vide copyright]
Table of Contents
Preface
1 Introduction
1.1 General context
1.2 Aim of this report
1.3 Structure of the report
2 Survey overview
2.1 Survey implementation
2.2 Survey population
2.3 Coverage and response rate
2.4 Survey instrument and method
2.5 Field report
2.5.1 Field time
2.5.2 Length of interviews
2.6 Data preparation and testing
3 Descriptive analysis
3.1 Security ‘threat’ categories
3.2 Areas of economic activity
3.3 Broad segmentation of security products and services
3.4 Cyber security
3.4.1 Cyber security products and services
3.4.2 Cyber/IT business activities
3.5 ‘Other’ security product providers
3.5.1 ‘Other’ security products
3.5.2 ‘Other’ security products business activities
3.6 ‘Other’ security service providers
3.6.1 ‘Other’ security services
3.7 Security market by economic sector (end-user)
3.7.1 Overall – all products and services
3.7.2 Breakdown by main broad category of security products and services
3.8 Security market by geographical region
3.8.1 Geographical markets – all products and services
3.8.2 Breakdown by main broad category of security products and services
3.9 Firm structure: employment and turnover
3.9.1 Employment
3.9.2 Turnover
3.10 Growth performance and prospects
3.10.1 Past turnover growth performance
3.10.2 Future turnover growth prospects
3.10.3 Future demand prospects by broad customer group and geographical area
3.11 Competitors
3.11.1 Geographical origin of main competitors – all products and services
3.11.2 Breakdown by main broad category of security products and services
3.11.3 Future competition prospects by geographical origin of main competitor
| 4 Aggregate estimates of the size of the security industry
4.1 Overview of approach
4.2 Method for the estimation of aggregate turnover and employment for the surveysample
4.2.1 Underlying assumptions
4.2.2 Estimation of turnover for non-declaring respondents
4.2.3 Estimation of employment levels for employment - size class ‘1000 or more employees’
4.2.4 Estimation of sample average values of employment and turnover per firm
4.3 Method for the initial estimation of aggregate turnover and employment
4.3.1 Underlying assumptions
4.3.2 Calculation of the initial estimate of the population of security companies
4.4 Variants and sub-groups
4.4.1 Adjustment for possible defence-related turnover and employment (variant)
4.4.2 Estimation of turnover and employment bymain broad industry category (sub-groups)
4.5 Size of the security industry: survey estimates and aggregate (national) extrapolation
4.5.2 Comparison of estimators
A.1. Product and services segmentation
A.2. Market Segmentation
Author (Corp. Body): Ecorys
Contributer: TNO | Europäische Kommission / Generaldirektion Migration und Inneres | DECISION
Year: 2015
Language: en
Ressource: Einzelne Berichte, Studien
Keyword: data securityserviceEUfire brigadeFranceinternetpolicesecurity
security policyespionagestatisticsenterprise
Subject: European Community law in general
Countries Scheme: Europe. General ResourcesFrance
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
Title: Study on the development of statistical data on the European security technological and industrial base : Security
Sector Survey Analysis: Italy
Abstract
This Background Report has been produced as part of the study on “Development of statistical data on the European security technological and industrial base” commissioned by the European Commission within the Framework Contract on Security (ENTR/09/050) between the European Commission and a consortium led by Ecorys Nederland B.V. in collaboration with TNO and DECISION.The Background Report provides an overview of initial findings from a survey of companies active in the (civil) security sector in Germany. It is one of a series of reports covering findings from surveys conducted for: Estonia, France, Italy, Poland, Spain and the United Kingdom. The survey design and subsequent data analysis has been undertaken by Ecorys, while the actual surveying of companies has been conducted by GfK, a specialist market research company. The individual country surveys of companies have been conducted over the period October 2014 to February 2015.To obtain comparable data for Germany, Ecorys has collaborated with the Brandenburg Institute for Society and Security (BIGS) who have conducted a similar survey in 2012 based on a common survey questionnaire design. This survey has been implemented as a follow-up round to previous surveys of companiesactive in the (civil) security sector in Germany undertaken by BIGS.[Author vide copyright]
Table of Contents
Preface
1 Introduction
1.1 General context
1.2 Aim of this report
1.3 Structure of the report
2 Survey overview
2.1 Survey implementation
2.2 Survey population
2.3 Coverage and response rate
2.4 Survey instrument and method
2.5 Field report
2.5.1 Field time
2.5.2 Length of interviews
2.6 Data preparation and testing
3 Descriptive analysis
3.1 Security ‘threat’ categories
3.2 Areas of economic activity
3.3 Broad segmentation of security products and services
3.4 Cyber security
3.4.1 Cyber security products and services
3.4.2 Cyber/IT business activities
3.5 ‘Other’ security product providers
3.5.1 ‘Other’ security products
3.5.2 ‘Other’ security products business activities
3.6 ‘Other’ security service providers
3.6.1 ‘Other’ security services
3.7 Security market by economic sector (end-user)
3.7.1 Overall – all products and services
3.7.2 Breakdown by main broad category of security products and services
3.8 Security market by geographical region
3.8.1 Geographical markets – all products and services
3.8.2 Breakdown by main broad category of security products and services
3.9 Firm structure: employment and turnover
3.9.1 Employment
3.9.2 Turnover
3.10 Growth performance and prospects
3.10.1 Past turnover growth performance
3.10.2 Future turnover growth prospects
3.10.3 Future demand prospects by broad customer group and geographical area
3.11 Competitors
3.11.1 Geographical origin of main competitors – all products and services
3.11.2 Breakdown by main broad category of security products and services
3.11.3 Future competition prospects by geographical origin of main competitors
| 4 Aggregate estimates of the size of the security industry
4.1 Overview of approach
4.2 Method for the estimation of turnover and employment for the survey sample
4.2.1 Underlying assumptions
4.2.2 Estimation of turnover for non-declaring respondents
4.2.3 Estimation of employment levels for employment - size class ‘1000 or more employees’
4.2.4 Estimation of sample average values of employment and turnover per firm
4.3 Method for the initial estimation of aggregate turnover and employment
4.3.1 Underlying assumptions
4.3.2 Calculation of the initial estimate of the population of security companies
4.3.3 Calculation of initial estimates of aggregate (national) turnover and employment
4.4 Variants and sub-groups
4.4.1 Adjustment for possible defence-related turnover and employment (variant)
4.4.2 Estimation of turnover and employment by main broad industry category (sub-groups)
4.5 Size of the security industry: survey estimates and aggregate (national) extrapolation
Annexes
Product and services segmentation
Market Segmentation
Author (Corp. Body): Ecorys
Contributer: TNO | Europäische Kommission / Generaldirektion Migration und Inneres | DECISION
Year: 2015
ISBN / ISSN / Kat.Nr: FU98408
Language: en
Ressource: Einzelne Berichte, Studien
Keyword: data securityserviceEUfire brigadeinternetItalypolicesecurity
security policyespionagestatisticsenterprise
Subject: European Community law in general
Countries Scheme: Europe. General ResourcesItaly
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
Title: Study on the development of statistical data on the European security technological and industrial base : Security
Sector Survey Analysis: Poland
Abstract
This Background Report has been produced as part of the study on “Development of statistical data on the European security technological and industrial base” commissioned by the European Commission within the Framework Contract on Security (ENTR/09/050) between the European Commission and a consortium led by Ecorys Nederland B.V. in collaboration with TNO and DECISION.The Background Report provides an overview of initial findings from a survey of companies active in the (civil) security sector in Germany. It is one of a series of reports covering findings from surveys conducted for: Estonia, France, Italy, Poland, Spain and the United Kingdom. The survey design and subsequent data analysis has been undertaken by Ecorys, while the actual surveying of companies has been conducted by GfK, a specialist market research company. The individual country surveys of companies have been conducted over the period October 2014 to February 2015.To obtain comparable data for Germany, Ecorys has collaborated with the Brandenburg Institute for Society and Security (BIGS) who have conducted a similar survey in 2012 based on a common survey questionnaire design. This survey has been implemented as a follow-up round to previous surveys of companiesactive in the (civil) security sector in Germany undertaken by BIGS.[Author vide copyright]
Table of Contents
4 Aggregate estimates of the size of the security industry
4.1 Overview of approach
4.2 Method for the estimation of aggregate turnover and employment for the surveysample
4.2.1 Underlying assumptions
4.2.2 Estimation of turnover for non-declaring respondents
4.2.3 Estimation of employment levels for employment - size class ‘1000 or more employees’
4.2.4 Estimation of sample average values of employment and turnover per firm
4.3 Method for the initial estimation of aggregate turnover and employment
4.3.1 Underlying assumptions
4.3.2 Calculation of the initial estimate of the population of security companies
4.3.3 Calculation of initial estimates of aggregate (national) turnover and employment
4.4 Variants and sub-groups
4.5 Size of the security industry: survey estimates and aggregate (national) extrapolation
4.5.1 Estimates of the population of security companies
4.5.2 Comparison of estimators
Annexes
A.1. Product and services segmentation
A.2. Market Segmentation
| Preface
1 Introduction
1.1 General context
1.2 Aim of this report
1.3 Structure of the report
2 Survey overview
2.1 Survey implementation
2.2 Survey population
2.3 Coverage and response rate
2.4 Survey instrument and method
2.5 Field report2.5.2 Length of interviews
2.6 Data preparation and testing
3 Descriptive analysis
3.1 Security ‘threat’ categories
3.2 Areas of economic activity
3.3 Broad segmentation of security products and services
3.4 Cyber security
3.4.1 Cyber security products and services
3.4.2 Cyber/IT business activities
3.5 ‘Other’ security product providers
3.5.1 ‘Other’ security products
3.5.2 ‘Other’ security products business activities
3.6 ‘Other’ security service providers
3.6.1 ‘Other’ security services
3.7 Security market by economic sector (end-user)
3.7.1Overall – all products and services
3.7.2 Breakdown by main broad category of security products and services
3.8 Security market by geographical region
3.8.1 Geographical markets – all products and services
3.8.2 Breakdown by main broad category of security products and services
3.9 Firm structure: employment and turnover
3.9.1 Employment
3.9.2 Turnover
3.10 Growth performance and prospects
3.10.1 Past turnover growth performance
3.10.2 Future turnover growth prospects
3.10.3 Future demand prospects by broad customer group and geographical area
3.11 Competitors
3.11.1 Geographical origin of main competitors – all products and services
3.11.2 Breakdown by main broad category of security products and services
3.11.3 Future competition prospects by geographical origin of main competitors
Author (Corp. Body): Ecorys
Contributer: TNO | Europäische Kommission / Generaldirektion Migration und Inneres | DECISION
Year: 2015
ISBN / ISSN / Kat.Nr: FU98408
Language: en
Ressource: Einzelne Berichte, Studien
Keyword: data securityserviceEUfire brigadeinternetPolandpolicesecurity
security policyespionagestatisticsenterprise
Subject: European Community law in general
Countries Scheme: Europe. General ResourcesPoland
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
Title: Study on the development of statistical data on the European security technological and industrial base : Security
Sector Survey Analysis: United Kingdom
Abstract
This Background Report has been produced as part of the study on “Development of statistical data on the European security technological and industrial base” commissioned by the European Commission within the Framework Contract on Security (ENTR/09/050) between the European Commission and a consortium led by Ecorys Nederland B.V. in collaboration with TNO and DECISION.The Background Report provides an overview of initial findings from a survey of companies active in the (civil) security sector in Germany. It is one of a series of reports covering findings from surveys conducted for: Estonia, France, Italy, Poland, Spain and the United Kingdom. The survey design and subsequent data analysis has been undertaken by Ecorys, while the actual surveying of companies has been conducted by GfK, a specialist market research company. The individual country surveys of companies have been conducted over the period October 2014 to February 2015.To obtain comparable data for Germany, Ecorys has collaborated with the Brandenburg Institute for Society and Security (BIGS) who have conducted a similar survey in 2012 based on a common survey questionnaire design. This survey has been implemented as a follow-up round to previous surveys of companiesactive in the (civil) security sector in Germany undertaken by BIGS.[Author vide copyright]
Table of Contents
Preface
1 Introduction
1.1 General Context
1.2 Aim of this report
1.3 Structure of the report
2 Survey overview
2.1 Survey implementation
2.2 Survey population
2.3 Coverage and response rate
2.4 Survey instrument and method
2.5 Field report
2.5.1 Field time
2.5.2 Length of interviews
2.6 Data preparation and testing
3 Descriptive analysis
3.1 Security ‘threat’ categories
3.2 Areas of economic activity
3.3 Broad categories of security products and services
3.4 Cyber security
3.4.1 Cyber security products and services
3.4.2 Cyber/IT business activities
3.5 ‘Other’ security product providers
3.5.1 ‘Other’ security products
3.5.2 ‘Other’ security products business activities
3.6 ‘Other’ security service providers
3.6.1 ‘Other’ security services
3.7 Security market by economic sector (end-user)
3.7.1 Overall – all products and services
3.7.2 Breakdown by main broad category of security products and services
3.8 Security market by geographical region
3.8.1 Geographical markets – all products and services
3.8.2 Breakdown by main broad category of security products and services
3.9 Firm structure: employment and turnover
3.9.1 Employment
3.9.2 Turnover
3.10 Growth performance and prospects
3.10.1 Past turnover growth performance
3.10.2 Future turnover growth prospects
3.10.3 Future demand prospects by broad customer group and geographical area
3.11 Competitors
3.11.1 Geographical origin of main competitors – all products and services
3.11.2 Breakdown by main broad category of security products and services
3.11.3 Future competition prospects by geographical origin of main competitors
| 4 Aggregate estimates of the size of the security industry
4.1 Overview of approach
4.2 Method for the estimation of turnover and employment for the survey sample
4.2.1 Underlying assumptions
4.2.2 Estimation of turnover for non-declaring respondents
4.2.3 Estimation of employment levels for employment - size class ‘1000 or more employees’
4.2.4 Estimation of sample average values of employment and turnover per firm
4.3 Method for the initial estimation of aggregate turnover and employment
4.3.1 Underlying assumptions
4.3.2 Calculation of the initial estimate of the population of security companies
4.3.3 Calculation of initial estimates of aggregate (national) turnover and employment
4.4 Variants and sub-groups
4.4.1 Adjustment for possible defence-related turnover and employment (variant)
4.4.2 Estimation of turnover and employment by main broad industry category (sub-groups)
4.5 Size of the security industry: survey estimates and aggregate (national) extrapolation
4.5.1 Estimates of the population of security companies
4.5.2 Comparison of estimators
Annexes
A.1. Product and services segmentation
A.2. Market Segmentation
Author (Corp. Body): Ecorys
Contributer: TNO | Europäische Kommission / Generaldirektion Migration und Inneres | DECISION
Year: 2015
Language: en
Ressource: Einzelne Berichte, Studien
Keyword: data securityserviceEUfire brigadeGreat Britaininternetpolicesecurity
security policyespionagestatisticsenterprise
Subject: European Community law in general
Countries Scheme: Europe. General ResourcesUnited Kingdom
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
Title: Final Evaluation of Security Research under the Seventh Framework Programme for Research, Technological Development and
Demonstration : Final Report
Abstract
This report is the Final Report of the ‘Final Evaluation of Security Research under the Seventh Framework Programme for Research, Technological Development and Demonstration (FP7)’, which was commissioned, in 2014, by Directorate-General Enterprise and Industry (DG ENTR).A consortium led by Technopolis Group and including VVA, as well as the Manchester Institute of Innovation Research, conducted the research for this study in the period from August 2014 to August2015. This report presents the detailed results and analyses, conclusions and recommendations from the evaluation.These are based on findings from data collection and analyses, drawing on desk research, data from the CORDA database, surveys of participants and end-users, stakeholder interviews, a series of case studies, and a stakeholder workshop.[Author vide copyright]
Table of Contents
1. Introduction
1.1 This report
1.2 Key parameters of the evaluation
1.3 Structure of the Report
2. Methodology
2.1 Overall approach
2.2 Desk research
2.3 Analysis of statistical data
2.4 Participant survey
2.5 End-user survey
2.6 Stakeholder interviews
2.7 Case studies
2.8 Stakeholder workshop
3. Evaluation results
3.1 Overview of FP7 Security Research Actions
3.2 Evidence Building Block 1: Rationale “why”)
3.3 Evidence Building Block 2: Implementation (“how”)
3.4 Evidence Building Block 3: Direct Achievements (“what”)
3.5 Evidence Building Block 4: Wider Achievements (“what”)
3.6 Evidence Building Block 5: European Added Value
3.7 Evidence Building Block 6: Conclusions on FP7 & outlook for H2020
4. Conclusions and recommendations
4.1 Conclusions
4.2 Recommendations
Author (Corp. Body): Technopolis Group
Contributer: Europäische Kommission / Generaldirektion Migration und Inneres
Year: 2015
ISBN / ISSN / Kat.Nr: 978-92-79-40838-0 | NB-02-14-003-EN-N
Language: en
Ressource: Einzelne Berichte, Studien
Keyword: evaluationdevelopmentEUresearchsecuritysecurity policystatisticstechnology
Subject: European Community funds and other financial instrumentsResearchOrganization of research
Countries Scheme: Europe. General Resources
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
Title: Strategic recommendations for secure societies theme in Horizon 2020 : Secure Societies ; Protecting freedom and
security of Europe and its citizens
Abstract
This document offers strategic recommendations to the European Commission on how the Secure Societies Theme in Horizon 2020 should be developed to address the longer-term priorities and opportunities. In developing this strategic recommendation the SSAG has considered a wide range of factors including in particular:User organisation priorities, indicating where research and innovation is most likely to deliver benefit to important needs and especially anticipating new trends,Approaches to the formulation of the Work Programmes that are most appropriate to generate effective outcomes and raise competitiveness of EU industry.The primary content of this document was prepared by three working groups of the SSAG(2014-2015).The scope of the Secure Societies theme is very broad and the SSAG looked at several ways to structure the discourse.[Author vide copyright]
Table of Contents
1. Executive Summary
2. Introduction
3. Innovation Roadmapping
4. Drivers for Future Work Programmes – Overview
5. Driver 1 - Societal Security & Trust of the Citizen
6. Driver 2 - Crime and Crime Prevention
7. Driver 3 – Trusted Digital Economy
8. Conclusion
Author (Corp. Body): Secure Societies Advisory Group
Contributer: Europäische Kommission / Generaldirektion Migration und Inneres
Year: 2015
Language: en
Ressource: Einzelne Berichte, Studien
Keyword: citizendata securityEUsocietyinternetcriminalitypreventionsecurity
economy
Subject: European Community law in generalVarious information networks and systems
Countries Scheme: Europe. General Resources
Online Ressource: vorübergehend nicht erreichbar!
Bitte beachten Sie die urheberrechtlichen Bedingungen der Dokumentenbenutzung / Please observe the copyright when accessing the document | Quelle / Source: Europäische Kommission (http://ec.europa.eu/)
1 | 2 | 3
« Previous
Next »
Copyright (C) 2003-2019 European Documentation Centres / Update: 09.10.2019