Concentris Research Management GmbH

Concentris Research Management is looking for partners to work on HORIZON-CL3-2024-FCT-01-01

Last update: Feb 9, 2024
To apply for this call to your existing account or an account for free.
Last update: Feb 9, 2024 Last update: Feb 9, 2024


Deadline: Nov 20, 2024
Project locations: EU 27 EU 27
Sectors: Information & Communication Technology, Research Information & Communication Technology, Research
Partner types: Academic Institution, Consulting Organization, Government Agency, NGO, Other Academic Institution, Consulting Organization, Government Agency, NGO, Other
Partner locations: EU 27, Europe Non EU 27 EU 27, Europe Non EU 27


No documents to display


We are specialised in PROPOSAL WRITING, PROJECT MANAGEMENT, DISSEMINATION/ COMMUNICATION/ TRAINING and MEETING ORGANISATION for Horizon Europe projects. We carry out the non-scientific tasks and provide support and consultancy for scientists from the first project idea to the project completion. Our interdisciplinary team consists of project managers with scientific background, graphics designers, web developers, and social media experts with passion for research. 

Mitigating new threats and adapting investigation strategies in the era of Internet of Things


Programme: Horizon Europe Framework Programme (HORIZON)
Call: Fighting Crime and Terrorism 2024 (HORIZON-CL3-2024-FCT-01)

Projects’ results are expected to contribute to all of the following outcomes:

Increased understanding of Police Authorities regarding the emerging (digital and especially physical) threats of the fast-developing environment of Internet of Things;
Modern tools to tackle new and emerging forms of crime pertaining to the development of Internet of Things are provided to European Police Authorities and other relevant security practitioners, which take into account legal and ethical rules of operation, cost-benefit considerations, as well as fundamental rights such as privacy and protection of personal data;
Lawful access and exploitation of evidence in the environment of the Internet of Things are fortified;
Best practices (legal, organisational, technical) to access and exploit Internet of Things in the course of investigation are strengthened, including by developing relevant tools and training materials.
Internet of Things (IoT) connects practically everything and makes everything more vulnerable as well. IoT devices increasingly benefit from the convergence and integration of technologies, such as machine learning, real-time analytics as well as 5G that will provide faster and more reliable connections for all devices.

There are a number of implications particular to IoT devices, which have been consistently highlighted by researchers and Police Authorities. For example, the vulnerability of IoT devices may be exploited by criminals who seek to collect personal data, compromise user credentials or spy on organisations or people. Furthermore, IoT devices may represent a threat that goes beyond the digital world, i.e. they may become an increasingly physical threat, since they find applications in, e.g., industry and infrastructure, as well as in building smart cities. Malevolent actions against connected devices with direct physical impact (e.g. car-to-car communication, hacking of vehicles, hospitals, nuclear plants) are also a growing concern.

Please, visit the following page to get more information regarding this call: