Joint Master in Information Security and Data

Application Form
Selection: 2015
KA2 – Cooperation for innovation and the
exchange of good practices –
Capacity Building in the field of Higher
Education
Call for Proposal EAC/A04/2014
Joint Master in Information Security and Data Management /
(ISDM)
DETAILED DESCRIPTION OF THE PROJECT
(To be attached to the eForm)
Version 1 – 1.10.2014
Joint Master in Information Security and Data Management / (ISDM)
Page 1 of 54
PART D - Quality of the project team and the cooperation arrangements
D.1. Organisations and activities
This part must be completed separately by each organisation participating in the project (applicant and
partners).
Partner number ☒
P1
Organisation name &
Palestine Technical University Kadoorie
acronym
PTUK
D.1.1 - Aims and activities of the organisation
Please provide a short presentation of your organisation (key activities, affiliations, size of the
organisation, etc.) relating to the area covered by the project (limit 2000 characters).
Palestine Technical University- Kadoorie(PTUK) was established in 1930 as the first agricultural school in
the region . The college widely participated in graduating specialists both in farm and animal production.
In 1994, Palestinian National Authority took charge of the higher education system, the college was
transformed into the technical field. After that the college was developed to give bachelor degrees in
different specializations. In 2007 PTUK was accredited as the first technical governmental (state) university
in Palestine with focus on engineering, applied sciences and business. PTUK is trying to integrate
Entrepreneurial Learning in curriculum and to enhance partnership with enterprise and local market. The
university adopted the MOHE strategy in Entrepreneurship as considered one priority in the 3 year plan.
In terms of affiliations, PTUK has an outstanding reputation for projects funded by the World Bank , EC ,
FP7 and currently PTUK is a partner in a TEMPUS project (PalGOV).
Palestine Technical University -Kadoorie (PTUK) is the only Technical- Governmental (State) University in
Palestine. Its mission statement is "graduating highly qualified talented leaders with distinguished
scientific, practical and research abilities enjoying practical capacity to carry out successful tasks that fulfil
the private sector needs to compete so as to find suitable careers. The University is looking forward to
start programs based on partnership with the private, public and governmental sectors to achieve
development in economic and social fields".
PTUK’s vision is to provide the Palestinian market as well the markets of the Arab neighboring countries
with graduates who are well-oriented towards technical and applied fields in applied natural sciences,
engineering, and information technology. Now, the University currently has about 6000 students (with
almost 1:1 male-female ratio), and is expected to have approximately. The mission of PTUK has always
been to bring graduates and services to the society, for the sake of development and welfare of the
society. Accountancy and computerized information system are now active specializations in the
advanced societies.
Please describe also the role of your organisation in the project (limit 1000 characters).
PTUK will lead and manage the whole process of the project and involve in the project launching. They will
admininster all the financial operations.
D.1.2 - Operational capacity: Skills and expertise of key staff involved in the project
Please add lines as necessary.
Summary of relevant skills and experience, including where relevant a list of
Name of staff member
recent publications related to the domain of the project.
Dr. Eleyan has a good relevant diversity experience in academic and industry.
Dr. Derar Eleyan
I have a PhD in Information Systems and Msc in Business Information
Joint Master in Information Security and Data Management / (ISDM)
Page 2 of 54
Technology. Dr. Eleyan recently working as a Vice president for Admin and
Financial affair at PTUK. He served five years as an assistant professor at
Birzeit University in the Department of Computer Science teaching variety of
courses at the undergraduate and postgraduate levels. He has worked also as
lecturer and course team leader in computing at South East Essex college of
Arts and Technology where he taught various modules as, information
system, project management, database, web database, and website
management, Computer and Business Ethics, Research methods. He has a
good expertise as an Information Systems Consultant at BAS Computer
Systems a private company since 2003 till 2006. On 2006, He was a visiting
lecturer at the University of Manchester, teaching an MSc course of
Enterprise System Modelling, collaborating with Prof. Loucopoulos. He has
served as an external reviewer to some conferences in information science,
information systems and business process modelling. His research interests
focuses in System dynamics, software quality, Information Systems, Business
Process Modelling, Customer service and satisfaction and return on
investment, information technology management, IT project management,
Quality of Service, Academic quality and performance evaluation, Business
and computer ethics, Software testing quality assurance, Usability and ecommerce websites, Web decision systems.
He is a member of some
societies as British Computer Society (BCS), Institute for Learning (IFL),
Systems Dynamics Society (SDS).
Dr. Mutamed Khatib
Dr. Nael Salman
Dr. Mutamed Khatib received his B.Sc. degree in Telecommunication
Engineering from Yarmouk University, Irbid, Jordan in 1996 and M.Sc. in
Electrical and Electronic Engineering from Jordan University of Science and
Technology, Irbid, Jordan in 2003. He received his PhD Degree in wireless and
mobile systems from University Sains Malaysia (USM), Malaysia in 2009. From
1996 to 2005, he worked as Transmission, Outside Broadcasting and Studio
Engineer in Palestinian Broadcasting Corporation (PBC). From 2005 to 2009
he worked as an Instructor in the Department of Electrical Engineering,
Palestine Technical University (Kadoorie), Tul Karm, Palestine. Since
September 2009, Dr. Mutamed Khatib is working as associate professor at the
same university. Nowadays, he is the dean of college of engineering and
technology there.
Dr. Khatib has participated in many research projects and got many research
grants from different sponsors such as Malaysian Ministry of Science,
Technology and Innovation (MOSTI), Palestinian-American Research Center
(PARC) and European Union (TEMPUS project). He has a number of
publications to his credit in various international journals and conference
proceedings.
Dr. Nael SALMAN received his PhD in Computer Engineering from Middle
Joint Master in Information Security and Data Management / (ISDM)
Page 3 of 54
East Technical University (METU), Ankara, Turkey in 2006. He is an assistant
professor in computer engineering at the department of Electrical and
Computer Engineering at Palestine Technical University–Kadoorie(PTUK).
Currently, Dr. Salman is the Dean of Community Service and Development
Affairs.
Dr. Salman started his job as a lecturer at PTUK in 1996. From 2000 to 2007
he worked as an instructor in the Department of Computer Engineering at
Cankaya University, Ankara-Turkey. In January, 2007, Dr. Salman returned to
Palestine where he rejoined PTUK and served as the head of the department
of Electrical and Computer Engineering from Sep. 2010 to Feb. 2012.
Dr. Salman has a number of publications in various international journals and
refereed conference proceedings. He is also a program committee member
of Software Engineering conference organized annually in Turkey. Dr. Salman
also participated as an IT consultant in several TEMPUS, QIF funded projects.
His research Interests include the fields of Software Engineering, Software
measurement, Web Application development, Network security, and
Database systems.
Mr. Rami Debee
Mr.Debee received the M.Sc degree form birzeit University in scientific
computing since 2005, also he got his B.Sc degree from An-Najah University
in electrical Engineering – computer branch .he is now working as a lecturer
at Palestine technical university in the college of engineering and technology
–computer engineering department .he is a cisco certified instructor and a
trainer in the continuing education center , and he is active member in many
organizations.
Joint Master in Information Security and Data Management / (ISDM)
Page 4 of 54
Partner number ☒
P2
Organisation name &
HAROKOPIO UNIVERSITY
acronym
HUA
D.1.1 - Aims and activities of the organisation
Please provide a short presentation of your organisation (key activities, affiliations, size of the
organisation, etc.) relating to the area covered by the project (limit 2000 characters).
The Harokopio University of Athens was founded on 1991. Its design and evolution
since then has been conducted based on international standards, as well as on
scientific studies dictated by the Ministry of Education. Today, the Harokopio
University of Athens has more than 1000 students, dispersed in its 4 departments,
namely the department of Home Economics and Ecology, the department of Dietetics
and Nutritional Science, the department of Geography, as well as the department of
Informatics and Telematics. Moreover, 4 postgraduate programmes operate in the
University, for offering high quality knowledge to its graduates. Additionally, the
University has obtained significantly high ratings with regards to citations per
professor / researcher and is thus greatly acknowledged within the international
academic community. In particular, according to a special study conducted by the
National Documentation Centre, the Harokopio University of Athens is one of the four
Greek Universities that have been continuously publishing work that is highly
acknowledged and dispose impact levels that lie beyond or at the world average.
Department of Informatics and Telematics
Current necessities dictated by the Information Society and the Knowledge Society
envisage professionals who will be able to effectively manage new technologies
based on the Internet and the World Wide Web, aiming at the development of
complex information systems and the support of advanced services.
In this context, the department of Informatics and Telematics (www.dit.hua.gr) was
founded in 2006 and accepts Undergraduate students since the academic year 20072008. On 2011, the department has launched its postgraduate programme in
Informatics and Telematics , with three MScs in “Computational and Internet
Technologies and Applications”, “Advanced Telecommunication Systems and
Applications”, “Advanced Information Systems in Management”.
The mission of the department is to promote the Informatics science, primarily in the
areas of network-centric systems and e-services, so as to provide students with the
theoretical and practical skills and competences, which are necessary for the design,
development and delivery of technical solutions, in the fields of Information and
Communication Technologies.
The scientific directions of the department include the following:
•
modern e-services and applications, such as e-health, e-learning, e-commerce,
e-government, intelligent transportation systems;
•
wireless networks and mobile communications, optics, autonomic computing
and cognitive networking;
•
parallel and distributed systems, grid computing environments and cloud
computing;
•
system modeling and simulation, as well as human-machine interaction;
•
knowledge management and semantics in data management – data mining
from databases and the world wide web;

Information
processes;
flow
systems,
web
services
and
applications
in
business

Social media and web 2.0 applications (information harvesting and data
aggregation)
The graduates of the department are trained with scientific completeness in the
department knowledge areas and thus dispose a direct interconnection with all areas
of informatics applications. In this respect, they will be qualified to handle the
Joint Master in Information Security and Data Management / (ISDM)
Page 5 of 54
increased requirements of modern society.
Around 100 students are admitted every year. The duration of the undergraduate
course is eight semesters (four years) and leads to a degree. The curriculum is
composed of both theoretical and applied courses.
Last, the department continually upgrades its infrastructure equipment (hardware,
mobile devices, sensors etc.) and information resources (books and access to
scientific journals) to advance teaching and research efforts of its members.
Please describe also the role of your organisation in the project (limit 1000 characters).
HUA will lead the workpackage (WP2) and involve on other acticivites as management and quality
workpackages.
D.1.2 - Operational capacity: Skills and expertise of key staff involved in the project
Please add lines as necessary.
Summary of relevant skills and experience, including where relevant a list of
Name of staff member
recent publications related to the domain of the project.
Prof. Peri Loucopoulos
Partner number ☒
Organisation name &
MIDDLESEX UNIVERSITY HIGHER EDUCATION CORPORATION
acronym
MU
D.1.1 - Aims and activities of the organisation
Please provide a short presentation of your organisation (key activities, affiliations, size of the
organisation, etc.) relating to the area covered by the project (limit 2000 characters).
Joint Master in Information Security and Data Management / (ISDM)
Page 6 of 54
P3
Middlesex University is a large International University with 35, 000 students many of who study
overseas, with campuses in London, Dubai Mauritius and soon in Malta. Middlesex University
consists of six Schools and the Institute of Work -Based Learning. Since 1996 MDX has received 3
Queen’s Anniversary Prizes and a Queen’s Award for Enterprise, the only UK university to achieve
this recognition. MDX has an excellent record of QAA accreditations, and has also extensive
experience in developing and delivering undergraduate, Master’s and PhD programmes in a
range of fields. We have an extensive network of international links and have been collaborating
in joint research projects funded mainly by EU iniatives and programmes. The University
pioneered e-learning and e-training support through the use of innovative technologies and elearning strategies. Experts from across the University ensure that all programmes adhere to the
EQF, ENQA standards and the QAA (UK).
Please describe also the role of your organisation in the project (limit 1000 characters).
The Department of Computer Science has extensive experience in quality assurance projects
funded under Tempus and also in knowledge transfer activities. The proposed team has secured in
the past research funds from JISC towards developing tools and practices for aligning curriculum
documentation and mapping course information by using an information model that is now a
national standard. The eXchanging Course Related Information – Content Advertising Profile
(XCRI-CAP) model was used to provide a service for comparing course details and various fields
used for curriculum design and development. Middlesex University can provide the infrastructure
and experience required for mapping and alignment between the different grading systems and
curriculum structures that exist in the project’s partner institutions.
D.1.2 - Operational capacity: Skills and expertise of key staff involved in the project
Please add lines as necessary.
Summary of relevant skills and experience, including where relevant a list of
Name of staff member
recent publications related to the domain of the project.
Georgios A. Dafoulas
Dr George Dafoulas is a Principal Lecturer in Business Information
Systems at School of Sciences & Technology. He is the Programme
Leader for various programmes and has served as the Curriculum
Leader in Pedagogy for Global Campus and a member of the
University’s e-Learning Strategy Group. He has extensive experience in
managing research projects including AUNP and Minerva projects,
while he is currently involved with two Tempus projects. Over the past
four years he has managed eight projects funded by the JISC research
council in the UK. His published work includes journal and conference
papers in the fields of e-learning and social media and has several PhD
students and current research activities in social learning networks.
 Saleeb, N. & Dafoulas, G. (2011) Affordances and Constraints to ELearning: Role of Architecture in 3D Learning Space Digital Design
in International Journal for Digital Society, vol. 2, no. 3, pp. 36-47.

Serce, F.C., Swigger, K., Alpaslan, F.N., Brazile, R., Dafoulas, G.
And Lopez, V. (2011) Exploring the Communication Behavior
among Global Software Development Learners, Special Issue of
Global Software Development in the International Journal of
Joint Master in Information Security and Data Management / (ISDM)
Page 7 of 54
Computer Applications in Technology (IJCAT) (To Appear)

Serce, F.C., Swigger, K., Alpaslan, F.N., Brazile, R., Dafoulas, G.
And Lopez, V. (2011) Online collaboration: Collaborative behavior
patterns and factors affecting globally distributed team performance
Computers in Human Behavior, Volume 27, Issue 1, January 2011,
Pages 490-503.

Saleeb, N. & Dafoulas, G. (2010) Turning Immigrants to Citizens:
Merits of the pedagogical shift in 3D Virtual Learning Environments
in International Journal for Infonomics (IJI), vol. 3, no. 4, pp. 369381.
Saleeb, N. & Dafoulas, G. (2010) Effects of Virtual World
Environments in Student Satisfaction: An Investigation of the Role of
Architecture in 3D Education in International Journal of Knowledge
Society Research (IJKSR), vol. 2, no. 1, pp. 28-48.
Balbir Barn
Professor Balbir S. Barn, BSc, PhD, Deputy Dean, is Professor of
Software Engineering at Middlesex University, UK. Balbir has over 15
years commercial research experience working in research labs at Texas
Instruments and Sterling Software where he was involved in the
research and design of leading software products such as the IEF™. His
research is focused on model driven software engineering where the
goal is to use models as abstractions and execution environments to
support, for example, enterprise architecture and application integration
using complex events. He has led numerous externally funded projects
which apply model driven principles to business processes, user
interface design, learning theories and more recently the theory building
aspects to model driven engineering. Currently Balbir's research
interests include Enterprise Architecture simulation languages and
incorporation of value sensitive issues in Enterprise Architecture.
Current externally funded projects include the multi-disciplinary project
– MAYOT: Mobile Applications for Youth Offending Teams
(http://www.mayot.mdx.ac.uk). This project includes experts from the
fields of criminology and social policy.
 Balbir S. Barn, Ravinder Barn, Jo-Pei Tan: Young People and Smart
Phones: An Empirical Study on Information Security. HICSS 2014:
4504-4514

Tony Clark, Balbir Barn: Goal Driven Architecture Development
using LEAP. Enterprise Modelling and Information Systems
Architectures 8(1): 40-61 (2013)

Balbir S. Barn, Tony Clark: Revisiting Naur's Programming as
Theory Building for Enterprise Architecture Modelling. CAiSE
2011: 229-2

Tony Clark, Balbir S. Barn: A common basis for modelling service-
Joint Master in Information Security and Data Management / (ISDM)
Page 8 of 54
oriented and event-driven architecture. ISEC 2012: 23-3

Balbir S. Barn, Tony Clark: A Domain Specific Language for
Contextual Design. HCSE 2010: 46-61.
P4
Partner number ☒
European centre of Studies and Initiatives
CESIE
D.1.1 - Aims and activities of the organisation
Please provide a short presentation of your organisation (key activities, affiliations, size of the
organisation, etc.) relating to the area covered by the project (limit 2000 characters).
Organisation name &
acronym
CESIE (www.cesie.org) is a European Centre of Studies and Initiatives, non-profit, apolitical, secular nongovernmental organisation established in 2001 and accredited by the Region of Sicily for Orientation of
Vocational Education and Training, with macro-typology of Higher Education and lifelong learning (LLL) for
"development, introduction and implementation of reforms in education, training to increase integration
and develop employability".
Our MISSION is to promote growth through innovative and participative educational approaches.
CESIE is active in several MEDA countries to reduce youth unemployment in the Mediterranean area
through the promotion of mobility and vocational education of young people, building their capacities in
the sectors of needs analysis and project management at Mediterranean level.
Approaches and methods: CESIE develops integrated projects on the basis of social demands and with the
participation of stakeholders and the various forms of social representations, meant to serve as a space
for interaction of theory and practice, research and action, studies and initiatives – applying the holistic
approach CESIE’s activities are based on.
Structural organization: CESIE’s five departments work in synergy on activities related to: European
Cooperation, International Cooperation, Higher Education and Research, Mobility and Socio-cultural
Promotion. The head office is located in Palermo with other offices in India, Nepal and Senegal.
CESIE’s 35 staff members are international and multicultural, characterized by a wide range of profiles,
skills and qualifications. We also relies on 50+ external experts, including sociologists, psychologists,
researchers, professors, trainers, social workers, health professionals, and others. Equally important is the
contribution of up to 150 interns/volunteers per year from all over the world.
Affiliations and Networks: CESIE links local, national and international contexts and is committed to
stimulate development and change in cultural, educational and economic spheres through the creation
and use of innovative tools and methods.
Please describe also the role of your organisation in the project (limit 1000 characters).
Joint Master in Information Security and Data Management / (ISDM)
Page 9 of 54
To ensure a smooth flow of the project and continuous enhancement an accurate quality control and
monitoring plan and respective tools will be developed. The idea is two-fold: to constantly get feedback of
the participants on the quality of the project organization as well as conducting regular review of the
documentations to ensure accurate, financial and technical tracking of the project activities, when
requested by the grant-holder. The lead partner for the WP is CESIE and it will take care of timely and
efficient implementation of the QCM activities. The major tangible outputs for the WP will be the QCM
plan and tools, reports on WP implementation and achievements.
Next, the grant-holder with the EU partners will conduct monitoring by visiting the PCI and observing on
spot the project developments and achievements. The reports on WPs and the analysis of the visits will
feed into the intermediate and final reports to be submitted to EACEA. Close to the end of the project an
external audit will be invited to review the documentations, protocols and other documents related to the
project implementation for factual findings and report to EACEA.
The WP will be divided in two parts:
1) Internal monitoring: will be lead by CESIE as part of its role as project coordinator. The internal
monitoring will aim to supervise the work of partners and give support, while ensuring that all milestones
are reached through a quality process. All partners will be actively involved in the internal monitoring,
contributing to the achievement of the results and outputs of this WP. Communication will be an essential
part of internal monitoring because it will ensure the transfer of information regarding the project and
the performance of partners, as well as prevent and/or resolve possible challenges. In case of problems by
one partner or among partners in the project performance or in the development of the planned
activities, CESIE will activate a plan consisting mainly in:
 giving permanent support for the realisation of the activities, analysing with the partner(s) the
origin of the problem and proposing solutions to it
 monitoring the implementation of the possible solutions and their results
 involving all the Consortium to ensure other point of views and good practices to overcome the
problems
 foreseeing alternative solutions, informing and asking for support to the EC in case of need.
2) External monitoring: The grantholder will subcontract an external evaluator who will contribute to the
quality of work and the Consortium. The external evaluator will be in charge of
 monitoring all the activities at local and international levels;
 creating and delivering tools for the assessment of the quality of work and the impact of activities
(training and coordination events);
 developing annual reports based on the results of the evaluation activities;
 giving recommendations to the partnership on how to improve the project performance (if
needed);
 assist CESIE in the management of potential challenges of partners (if needed);
 participating in XX Consortium meetings, giving advice for the quality of the work programme.
D.1.2 - Operational capacity: Skills and expertise of key staff involved in the project
Please add lines as necessary.
Summary of relevant skills and experience, including where relevant a list of
Name of staff member
recent publications related to the domain of the project.
Project Manager at ‘Higher Education and Research’ department and
‘Visibility and communication office’ responsible at CESIE. European project
Luisa Ardizzone
experience gathered relating to Youth, Adult education, VET, school
education, higher education, Transversal Action on dissemination and
exploitation, (YiA; LLP Grundtvig, Comenius, Leonardo, KA4, Erasmus;
Joint Master in Information Security and Data Management / (ISDM)
Page 10 of 54
TEMPUS), Justice DPIP, Daphne III and ERDF (URBACT II, Thematic Networks),
establishing permanent links between the public and the private sector by
cooperating with HEI and local/regional authorities at local and international
level. Experienced in educational project management, Higher Education
capacity building, field Research, Quality Assurance and transversal
process/progress monitoring, dissemination strategies and implementation
Rita Quisillo
Letizia Portera
Degree in Politics and International Relations, Master in EU Project
Management. She is an experienced trainer in non-formal education and in
the management of EU-funded projects aiming at capacity building and
intercultural dialogue . In CESIE she is coordinating projects related to the
field of entrepreneurship and mobility, under the Erasmus for Young
Entrepreneurs Programme and mobility projects such as Leonardo da Vinci
and EVS. And she is coordinating the project Capacity Building relay Race –
CaBuReRa under the ENPI CBC MED Programme (www.caburera.org)
She has collaborated with CESIE since 2011. She works in the project
development office and she’s leading the work at CESIE for Daphne III
project, EuropeAid CSD EU-Turkey project Her experience includes
management of Europe for Citizens & YiA as a coordinator and trainer and
has been recently assigned to be project manager at CESIE for the H2020
project on market efficiency.
She’s also working in the International cooperation Department developing
project’s proposal under EuropeAid, ENPI and IPA.
Joint Master in Information Security and Data Management / (ISDM)
Page 11 of 54
P5
Partner number ☒
Organisation name &
acronym
ARAB AMERICAN UNIVERSITY-Jenin
AAUJ
D.1.1 - Aims and activities of the organisation
Please provide a short presentation of your organisation (key activities, affiliations, size of the
organisation, etc.) relating to the area covered by the project (limit 2000 characters).
The Arab American University-Jenin (AAUJ) located in the Governorate of Jenin was established in
September 2000 as the first private university in Palestine.
Since the 1970s, many Palestinian universities have been established in the West Bank. However, in
addition to being subject to the limitations of the conditions of occupation, these institutions have had to
rely mainly on insufficient levels of public funding and on charitable support from abroad. The founders of
AAUJ were moved to create a new paradigm: By mobilizing local private capital, this new private
university would not only avert many of the constraints of public funding, but it would also set a new
standard for Palestinian higher education.
AAUJ was conceived to accomplish the following strategic goals:
1. To provide excellence in education
2. To carry out engaged and applied research
3. To play a central role in the integrative and comprehensive development of the Jenin and
Tubas governorates in particular and in Palestinian development at large
4. To achieve financial sustainability and growth
AAUJ’s role as an engine and catalyst for human and economic development in the region and beyond
indicates its importance as an effective private-sector initiative and model not only for a new direction in
Palestinian higher education but also for integrative and comprehensive development.
Institutional Growth
In 2000 AAUJ began with an initial enrolment of 270 students, a couple dozen academic and administrative
staff, one faculty (Art and Sciences) and a single building. By the end of 2013, AAUJ has grown to include:
1. More than 500 academic and administrative employees 8,200 students (among them 2,570 Arab
students from inside Israel)
2. Seven faculties
 Arts and Sciences
 Dentistry
 Engineering and Information Technology
 Law
 Allied Medical Sciences
 Administrative and Financial Sciences (the largest in Palestine)
 Graduate Studies
AAUJ is currently building the largest sport village in Palestine.
Please describe also the role of your organisation in the project (limit 1000 characters).
AAUJ will participate in developing the program design and the developing the courses. They will also
arrange and host a workshop for evaluating the first year of the running program in the third year of the
project.
D.1.2 - Operational capacity: Skills and expertise of key staff involved in the project
Joint Master in Information Security and Data Management / (ISDM)
Page 12 of 54
Please add lines as necessary.
Summary of relevant skills and experience, including where relevant a list of
Name of staff member
recent publications related to the domain of the project.
Dr. Muath Sabha is the dean of the Faculty of Engineering and Information
Technology (EIT) at the AAUJ. Mr. Sabha is an assistant professor in
Computer Engineering, Computer Graphics, and he is the founder and the
chairman of the Multimedia Technology Department for six years in the
Muath Sabha
Faculty of Information Technology at the Arab American University of Jenin.
He is a Multimedia Technology Specialist and consultant in the Ministry of
Education and Higher Education for the Palestinian E-Learning Project. Mr.
Muath established an IT company in the field of Computer Graphics and
Multimedia Production named “Neiraba Animation Studios”.
Received the M.Sc. and Ph.D. degrees in computer science from the Ecole des
Mines (Excellence Engineering school) and Claude Bernard Lyon1 University
in 2002 and 2007 respectively (French government excellence scholarship).
Actually he is associate professor at AAUJ University and the coordinator for
the graduate program in computer science. He was researcher and lecturer in
the University of Le Havre and University of Claude Bernard Lyon1, Lyon,
France. Laboratory LMAH, Le Havre, Project GRR, and LIRIS laboratory at
research group SILEX team: Supporting Interaction and Learning by
Amjad Ratrout
Experience between 2006-2013, and ex member in: Knowledge and Complex
Systems (CoSyCo). He is member in Complex Systems and Multi Agents
paradigm team, and member in the « Association Francophone de Recherche
d'Information et Applications » (ARIA). His research addresses the study,
programming and modeling of complex, dynamic and distributed systems in
the Web using Multi Agent Systems paradigm with respect to the Complex
Adaptive Systems perspectives,WI Cloud computing, E learning, traffic
simulation and IS.
Adwan Yasin is an Associate professor at computer Science
Department(AAUJ), Former Dean of Faculty of Engineering and Information
Technology of the Arab American University of Jenin, Palestine. Previously he
worked at Philadelphia and Zarka Private University, Jordan. He received his
PhD degree from the National Technical University of Ukraine in 1996. He is
teaching graduated an under graduated courses. He has many Contributions
Adwan Yassin
in Departmental, Faculty, University committees, IT workshops, and Scientific
Conferences. He has many training certificates (MCSE,CCNA, C# Dot NET
Technology,..) and he is a member of technical committees of many
international journals. His research interests include Computer Networks,
Computer Architecture, Cryptography and Networks Security in which he has
many publications in international Conferences and journals.
Partner number ☒
Organisation name &
Hebron university
acronym
HU
D.1.1 - Aims and activities of the organisation
Please provide a short presentation of your organisation (key activities, affiliations, size of the
organisation, etc.) relating to the area covered by the project (limit 2000 characters).
Joint Master in Information Security and Data Management / (ISDM)
Page 13 of 54
P6
Hebron University was established in 1971 as pioneering higher education in Palestine. The university
started as a small college of Shari' a (Islamic Law) serving a total of 43 students.
Currently, Hebron University offers 39 programs leading to Bachelor degrees and 6 programs leading to
Master degree. Hebron University awards B.A or B.Sc degrees in each of its 10 faculties: Faculty of
Agriculture, Faculty of Al-Shari'a, Faculty of Arts, Faculty of Education, Faculty of Finance and
Management, Faculty of Science and Technology, Faculty of Nursing, Faculty of law, Faculty of pharmacy
and College of Graduate Studies & Scientific Research offers nine Master degrees in the Arabic Language
& Literature, English Linguistics, Business Administration, Islamic Judiciary Law, chemistry, Mathematics ,
Plant Protection, Sustainable Natural Resources and Management and History.
Hebron University is an independent Palestinian institution of higher education, serving over 8,500
students, around 70% of whom are female.
Computer Science (CS) department has founded in 1998, and it is the fourth department at the Faculty of
Science and Technology. CS department provides three programs for students to obtain bachelor's
degrees. The first program specializes in computer science whereas students who enroll in this program
need to successfully pass 127 credit hours. The second program specializes in Multimedia and Web
Technology. Additionally, CS department provide a bachelor's degree in Computer Networks Security and
Safety. Indeed opening a Master program in Information Security and IT Management (MISIM) will help
our students to join this program and give them too many opportunities for future jobs in Palestine and
abroad.
Please describe also the role of your organisation in the project (limit 1000 characters).
As a partner of this project, HU will form the basis of the continued international responsibilities to
achieve the objectives of this project. The management activities include: Planning of project activities,
contact between coordinator and consortium members, conducting workshops, communication over the
Internet to initiate, organize and follow-up project task.
D.1.2 - Operational capacity: Skills and expertise of key staff involved in the project
Please add lines as necessary.
Summary of relevant skills and experience, including where relevant a list of
Name of staff member
recent publications related to the domain of the project.
Dr. Hasasneh received his PhD in computer Engineering from the University
of Hull, UK, (2006), and his M.Sc. in Computer Engineering from Jordan
University of Science and Technology, Jordan, (2000), and B.Sc. in computer
Engineering from Palestine Polytechnic University, Palestine,(1997). Dr.
Hasasneh occupied many positions in Hebron University, where he was the
Head of the Computer Department and a member of many committees such
Dr. Nabil Hassasneh
as: Member of academic council, Member of Faculty of Science and
Technology council…etc. from 2000-present. Also, Dr. Hasasneh was
responsible for many computerized activities such as: The University
Computer Network, The University website development, the University
Software Systems development and also supervised E-learning Unit from
2009.
Joint Master in Information Security and Data Management / (ISDM)
Page 14 of 54
Currently, Dr. Hasasneh is working at Hebron University as the Dean of the
Faculty of Science and Technology and his current research activities are
focused around highly-parallel Chip Multiprocessors based DRISC Technology
or Microthreading. His work is published in a wide range of computer
architecture journals and international conferences. Several of his papers
have received a wards for contributions that have demonstrated long-term
impact. Dr. Hasasneh research interests include Computer Architecture,
Compiler Optimization, Multithreading, Chip Multiprocessors, E-learning and
Asynchronous Design.
Ph.D in Computer Engineering from the Dipartimento di Informatica e
Sistemistica
"A . Ruberti" (Department of Computer & Systems Engineering “A. Ruberti”)
at SAPIENZA Universita' di Roma (SAPIENZA University of Rome). Italy
http://www.dis.uniroma1.it/~dottoratoii/students/khalil-massri
PhD research activities can be summarized according to the following
branches:
Design, analysis and evaluation of efficient algorithms for routing protocols
applied in
Dr. Khalil Massri
mobile ad-hoc networks. Mainly, protocols used in Delay Tolerant Networks
(DTN) and
Mobile Computing Devices (MCD) networks.
Exploiting network coding algorithms in data delivery protocols used for adhoc and mobile
cloud networks. In particular, erasure-coding for data dissemination in mobile
clouds.
Real implementation and experimentation for data delivery protocols using
wireless resource constrained devices, such as Mobile devices and active
RFIDs.
Moreb have professional experience in Information Technology and web
development and e learning system consultant and I work in Al- Quds
University, Birzeit University, An- Najah National and Hebron university and I
Mohammad Adnan
Moreb
have excellent relations and network for both staff and student among all
university and I work as Microsoft trainer, my experience due 10 years on age
32 reflect my innovation and creatively idea for my jobs.
in my CV I summarize most of my experience during last 8 years some of
related experience for e learning consultant as following:
Joint Master in Information Security and Data Management / (ISDM)
Page 15 of 54
•
Developing more than 30 web site for al-Quds University (2004-
2009), Hebron University (2009 – now) and consultant for many other
organizations, development web site using php, asp.net, CMS Drupal, joomla.
•
Establish the e learning unite in Hebron university and give the
training for more than 80 academic teacher in all facility to using the
eLearning system and work with them to design and develop fully e learning
course.
•
2 year experience as e learning consultant and trainer for LIT Project
(Al- Quds University, Birzeit University and An- Najah National), Microsoft
trainer for MCAD, MCSD
Joint Master in Information Security and Data Management / (ISDM)
Page 16 of 54
List of Associated Partners
(Where applicable)
These organisations may provide the consortium with facilities or assistance that enhances the quality of
work, but they cannot be responsible for core activities of the project (e.g. management, coordination,
monitoring, leader of a work group etc.). No financial contribution from the project grant will be allocated
to these organisations.
☒
Ref.nr
Name of organisation
Type of
institution
City
Country
Role in the project
Please insert rows as necessary
D.2. Cooperation arrangements, management and communication
This part must only be completed once by the applicant.
D.2.1 - Project management
Please define the organisation of the implementation of the project and the division of tasks between the
partners. Please explain the allocation of resources for each activity. Explain also how the tasks are
distributed amongst the partners and how project "ownership" is ensured (limit 3000 characters).
The project work packages and the relevant activities are distributed amongest partners based on their
experiences. The project consists of nine work packages. The project overall management will be
assigned to PTUK.
(Preparartion)
WP1 Exploration of EU teaching and research practises, preparing the roadmap for the project and
development of joint working protocols .
WP Leader (MU)
Activities:
- A1.1 Plan and Assess the needs for the information management
- A1.2 Plan and assess the needs of security
Joint Master in Information Security and Data Management / (ISDM)
Page 17 of 54
- A1.3 Kick-off Meeting Preparation
- A1.4 Organize study tour to the EU partners universities
(Development)
WP2 Program and Curriiculum Design
WP Leader (HUA/AAUJ)
- A2.1 Workshops for the program design and outline
- A2.2 Organise a study tour to HUA university
- A2.3 Developing Data Management Courses and tutorials
- A2.4 Developing Courses in Information Security
- A2.5 Developing courses for information privacy and ethics
- A 2.6 Organising a study tour to EU UNiversity.
- A2.7 Developing courses in computer forensics.
- A2.8 Developing elective courses.
(Preparation)
WP3 Preparation and Accreditation
WP Leader (PTUK/AAUJ)
- A3.1 Preparing the required documents for the accrediation process
- A3.2 Preparing for the Computer Security Labs
- A3.3 Organize a study tour to the EU universities
- A3.4 Bids and installation of the required equipments and softwares
(Quality)
WP 4 Quality Control
WP Leader (CESIE)
- A4.1 Prepare quality plan for both Internal and external monitoring
- A4.2 Quality of Management and Governance- proposed assessment criteria and indicators
(Exploitation and Dissemination)
WP5 Project Dissimination and Exploitation
WP Leader (HUA)
- A5.1 Develop Web Portal with web 2.0 functionalities
- A5.2 Publish Leaflets
- A5.3 Organise National workshops and raise awarness of the Program
- A5.4 Teaching
- A5.5 Sudents and supervisors mobility
(Management)
WP6 Project Management
WP Leader (PTUK)
- A6.1 Attending "Erasmus plus projects representatives meetings"
- A6.2 Formation of the steeing Group
- A6.3 Organising the Kick-off meeting
- A6.4 Financial and administrative management
- A6.5 Production of intermediate and final reports.
D.2.2 - Cooperation and communication arrangements of the consortium
Please explain the overall project and partnership management making specific reference to the
management plan and how decisions will be taken. Please describe how permanent and effective
communication and reporting will be ensured as well as the measures put in place for conflict resolution
(limit 2000 characters).
Joint Master in Information Security and Data Management / (ISDM)
Page 18 of 54
PTUK will take the lead in most of the aministrative work and the communications.
Joint Master in Information Security and Data Management / (ISDM)
Page 19 of 54
PART E - Project characteristics and relevance
E.1. Why does the consortium wish to undertake this project?
Please outline the motivation behind your project, clearly identifying the specific needs or problem/s which
it intends to solve. Explain how the project proposal fits within the development strategies of the Partner
Countries involved and how it addresses the priorities defined at national / regional level. Also explain why
this/these problem/s were selected instead of others. In particular, explain how the area of intervention has
been explored to guarantee that the project is offering something new compared to the existing situation.
Where applicable, explain any synergy with other EU initiatives should be highlighted (limit 5000
characters).
Governmental institutions but also the universities in Palestine suffer the scarcity of the basic knowledge
on information management, strategy, quality, privacy and security. These issues are important for
public, private and non-profit organizations. By getting the information management right, this will result
in reducing administrative labor cost- less actual time moving information around and outside the
enterprise. This saves massive amounts of staff time and labor cost. It also reduces wasted time and
mistakes – access to constantly updated information from an easy to locate source - prevents repetition
of work on out of date documents.
Getting the proposed project will improve the skills of the teaching staff in information protection and
management. These skills will be disseminated to other institutions in Palestine and Jordan through the
membership of other Palestinian and Jordanian Universities in the consortium. The project will also
empower academic staff and graduate students by providing the required facilities for MSc projects.
This project will facilitate better collaboration, which means Palestinian and Jordanian staff will work
closely with their European counterparts and build up expertise in the areas of security and information
management. Information management also helps with compliance of regulations, which will lead to
reduce the cost of audits. Information security and privacy including data protection, copyrights and
intellectual properties are of high priority in the Palestinian and Jordanian societies private and public
sectors.
Ethics, Copyright and Intellectual Property Issues in Computing and Privacy and Information Security
Concerns represent a crucial necessity for the Palestinian universities, industry and community as a
whole. The public and the private sectors in Palestine are not fully aware of the importance of having a
national framework of ethics and professional conduct to enhance the quality of service and protect the
overall society from computer, internet and social media crimes. The universities in Palestine are not
embedding these issues in their pedagogical curricula and do not pay fully attention of these concerns.
The industry also shows lack of understanding and application of the intellectual property and privacy
and information security concerns. IT strategy and management is also essential in strategic planning for
institutions and enterprises.
Please describe briefly how your project proposal was prepared (e.g., capitalising on previous experiences,
based on achieved outcomes in former projects, following previous cooperation amongst the consortium
members, etc.) (limit 1000 characters).
The idea of the project comes from PTUK as a state flourishing university in Palestine. Dr. Eleyan took the
initiative to contact different partners from EU and Palestine. These EU partners are renowned HEIs in
Europe and has the reuired expertise to support and lead the project.
If your proposal is based on the results of one or more previous projects / networks, please provide precise
references to this / these project(s) / network(s) in the table below.
Reference number ☒
Joint Master in Information Security and Data Management / (ISDM)
Page 20 of 54
Project dates
(year started and completed)
Programme or initiative
Title of the project
Coordinating organisation
http://
Website
Password / login if necessary for website
Please summarise the project outcomes and describe (a) how the new proposal seeks to build on them and, (b)
how ownership / copyright issues are to be dealt with (limit 1000 characters).
Please copy and paste tables as necessary.
E.2. Rationale for the setting-up of the consortium
Please explain why the selected partners are best suited to participate in this European project. Describe
innovative and or complementary skills, expertise and competences within the consortium directly relating
to the planned project activities. If associated partners are involved, please explain their role in the project
and the added value to the consortium (limit 3000 characters).
The partnership will be led by Harokopio University (HUA) in Greece has extensive experience in
successfully managing EU funded projects, development of graduate studies degrees and research
supervision. The academic staff at HUA will share their expertise in developing graduate programmes in
Information and IT management areas. They will have a significant role in developing and delivering
relevant modules and training programmes for staff, evaluating the overall programme and sharing
research. Dr. George Dafolos from Middlesex university UK will also provide advice on program and
courses design.
According to the Quality Assurance Plan (to be drafted by CESIE (month 4), monitoring and evaluation
will be conducted internally and externally on a six-monthly base. Evaluations will be both formative
(conducted during the project in order to improve the results) and summative (conducted at the end of
the project to assess achievements).
All planning and reporting tools will be provided to partners. Online evaluation questionnaires (after
meetings / during -after WP ending) will be prepared and sent out; responses will be analyzed and
reported.
E.3. European added value
Please describe the benefits of and need for European cooperation. Please describe also why the results
cannot be achieved through national, regional or local funding (limit 1000 characters).
This proposal aims to develop a new master program to bridge the gap of knowledge and build
competencies of the Palestinian society with the know-how for information management, quality,
privacy and security in various aspects of life. It will provide resources and training for academic staff
including facilities to develop the program modules. The project will transfer the know-how and best
practices from Europe to Palestine, through proposing a joint MSc in Information Security and Data
Management (ISDM). This project will focus on developing the academic modules and tutorials to
establish a joint MSc degree in the partners’ universities. In other words, the project aims to develop
teaching staff capacity building and graduate students in four main areas (information management,
Information security, IT Laws and Rules, and Computer forensics), which are the main challenges in
implementing any service either in private or public sector.
Joint Master in Information Security and Data Management / (ISDM)
Page 21 of 54
E.4. Innovative character
Indicate what the project is offering that is new and what are the main innovating elements (limit 2000
characters).
The project will provide a new MSc degree in Information Security and IT management. Getting the
proposed project will improve the skills of the teaching staff in information protection and management.
These skills will be disseminated to other institutions in Palestine through the membership of other
Palestinian Universities in the consortium. The project will also empower academic staff and graduate
students by providing the required facilities for MSc projects.
This project will facilitate better collaboration, which means Palestinian staff will work closely with their
European counterparts and build up expertise in the areas of security and information management.
Information management also helps with compliance of regulations, which will lead to reduce the cost of
audits. Information security and privacy including data protection, copyrights and intellectual properties
are of high priority in the Palestinian and Jordanian societies private and public sectors.
Ethics, Copyright and Intellectual Property Issues in Computing and Privacy and Information Security
Concerns represent a crucial necessity for the Palestinian universities, industry and community as a
whole. The public and the private sectors in Palestine are not fully aware of the importance of having a
national framework of ethics and professional conduct to enhance the quality of service and protect the
overall society from computer, internet and social media crimes. The universities in Palestine are not
embedding these issues in their pedagogical curricula and do not pay fully attention of these concerns.
The industry also shows lack of understanding and application of the intellectual property and privacy
and information security concerns. IT strategy and management is also essential in strategic planning for
institutions and enterprises.
Joint Master in Information Security and Data Management / (ISDM)
Page 22 of 54
PART F - Quality of the project design and implementation
F.1. Aims and objectives
Please define the concrete aims and objectives of the project and describe the ways in which the situation
set out under the previous section (Part E) will be changed (limit 3000 characters).
a.The development of the proposed MSc program's curriculum in cooperation with the partner
universities.
b.Capacity building of Palestinian and Jordanian academic staff by training a number of the teaching staff
to become the teaching core of the newly established MSc program.
c.Equipping laboratories to be utilized by graduates during their studies
d.Establish links with Palestinian, Jordanian and European local industry to provide ideas of relevant MSc
projects and placements for graduates
e.MSc modules to be taught jointly by staff members from Local and European institutions during the
implementation stage
f.Staff members from the consortium will embark on joint research in areas of common interest. This
includes the supervision of MSc students’ projects.
g.Improving the management skills of Data Centers in Palestinian and Jordanian institutions.
F.2. Project activities and Methodology
Please define the activities proposed and the working methodology (project activities/developments
including educational and training content and pedagogical approach) to be used for achieving the
objectives, including major milestones, measurable indicators, etc. (limit 6000 characters).
The main aim of this project is to develop a master degree at Palestine Technical UNiversity and Arab
American University and provide necessary supporting laboratory and library resources. The academic
contents of the programme will be developed during the first two years of the project.
To ensure the high standard and quality of the programme, it will be submitted to the Palestinian
Ministry of Higher Education for accreditation.
The research and laboratory infrastructure at ptuk in the Department of electrical and computer
Engineering is not up to what is expected for a university to run graduate studies and be able to provide
sufficient support to graduate level projects. PTUK requires support to build up their laboratory and
research facilities and resources to support the successful development and delivery of high standard
programme. The project will provide capacity building of Palestinian academics by training them on the
use of research facilities and by enabling a number of MSc holder staff to become PhD holders following
split-site doctorate programmes at EU partner institutions.
The lack of graduate studies in Information security at Palestinian institutions is attributed to the
requirements necessary to launch a successful programme. PTUK University believes that it is their duty
to serve the Palestinian population and to fill in the gap in higher education infrastructure by establishing
a master program in the proposed Information Security and IT management. The project will develop the
required master level programme and help in providing training and resources for researchers in a
methodological approach that takes into account the local needs and national priorities, and to fit them
within a global network of education and knowledge. In addition to developing the MSc programme, the
project will encourage research ethos culture among Palestinian academics by providing necessary
equipment and training and building research skills. .
The project will involve academics, students and stakeholders at different levels and implementation
stages. Academics from EU institution will share their graduate level teaching and research experience
with Palestinian academics by contributing to programme and module specifications and detailed
contents as well as delivering and reviewing a number of the designed modules. Palestinian academics
will enrich and enhance their teaching and research knowledge by visiting EU institutions and
participating in the implementation stages of the project and by contributing to programme and module
specifications and detailed contents as well as delivering and reviewing number of the designed modules.
Joint Master in Information Security and Data Management / (ISDM)
Page 23 of 54
During the first six months of the project, all partners will participate in round table discussion with
relevant Palestinian industries, organizations and government bodies to establish the level of
cooperation and assessment of need for MSc level graduates and support required for execution of
graduate level projects and seminars. The project will also investigate ways in which academia could
benefit the Palestinian engineering industry and other relevant organisation to ensure a two way flow of
knowledge for a sustainable national collaboration.
Also, a workshop will be held at during the second year of the project. Academics, industry and
government representatives of related research, teaching and training areas will be invited in an effort to
promote university-industry cooperation. The workshop will be open to all stakeholders including
students and professionals who may benefit from the development of the programme and support
facilities.
The specific project objectives are the following:
- The development of high quality Master programmes in information security in cooperation with the
partner institutions.
- - Building laboratory facilities to be utilized by graduate students during their courses and thesis
- Academic staff from Local and EU institutions will deliver the first year of the MSc
- Collaboration between the partners’ institutes to prepare joint research bids in areas in common
interest. Such cooperation will help sustain the joint activities beyond the life time of the project.
- Additionally, one of the project’s wider objectives is to establish collaboration in the Palestinian context
by engaging in discussion with Palestinian companies, professional and governmental organizations.
The cooperation between the partnership will last for three years and the project will be carried out in
three stages:
The Preparation Stage: careful planning will take place for the project kick-off meeting to ensure a
smooth start of the project. The kick-off meeting will be held at PTUK and will serve to establish the
needed atmosphere for the project success. The meeting will educate project partners about the
logistics and reporting requirements. This meeting will involve developing detailed planning the first six
months activities and an overall planning for activities throughout the project. The kick off meeting will
be followed by visits of the Palestinian partners to EU partners’ institutions to explore graduate teaching
facilities and research and training centres and discuss staff training requirement and programme
development areas and courses.
To assess collaboration between different entities in the Palestinian context that are necessary for the
success and sustainability of the project’s outcomes, all partners will participate in round table discussion
in a meeting to be held at Birzeit with relevant Palestinian industries, organizations and government
bodies. This will establish the level of cooperation and assessment of need for MSc level graduates and
support required for execution of graduate level projects and seminars. Ways for academics to benefit
the industry and relevant organisations will
F.3. Budget and cost effectiveness
Please describe the strategy adopted to ensure that the proposed results and objectives will be achieved in
the most economical way and on time. Explain the principals of budget allocation amongst partners.
Indicate the arrangements adopted for financial management and what co-financing modalities are
planned (limit 3000 characters).
n preparing this proposal we endeavored to achieve the objectives of the project in the most cost
effective way. We minimized travel by (i) arranging activities so that visitors perform multiple tasks on a
visit (monitoring, dissemination, promoting the Bologna process and financial management); (ii) using
video-conferencing and e-learning technologies when possible, particularly for teaching some of the
course; (iii) reducing staff cost to the minimum necessary and asking partners to provide some staff input
as their co-financing share; and (iv) limiting the purchase of equipment to items which are absolutely
necessary for the achievement of this project's objectives. We believe the project delivers good value for
money.
As for the budget allocation, a number of important principles were followed. First, Erasmus Plus rules
Joint Master in Information Security and Data Management / (ISDM)
Page 24 of 54
were strictly followed. Second, budget has been allocated to different partners based on the demands of
different tasks, activities and deliverables that they are involved in. For partner country universities, their
needs have been the guiding factor in allocation of equipment, printing and publishing budget and other
costs. For all partners, the budget for staff was guided by activities they are involved in and the time they
need to put. Third, to meet the responsibilities of the project’s administration and financial management,
PTUK was allocated an extra share of the budget
Financial management is the most crucial element of the project management. PTUK is skilled with
project coordination with experienced staff who worked on several Tempus projects before. They are
very familiar with Tempus rules and regulations. Additionally, all financial work is subject to the financial
and auditing rules of the PA. Any further training needed will be provided to ensure full understanding
and adherence to Tempus rule. A system will be in place to ensure that financial records are maintained
consistently in all institutions
F.4. Quality control and Monitoring
Please explain what mechanisms have been put in place for ensuring the quality of the project and how the
evaluation will be carried out. Please define the specific quality measures established, as well as the
benchmarks and indicators foreseen to verify the outcome of the action. Make sure that the information in
this section is consistent with the project Logical Framework Matrix (limit 3000 characters).
The qulaity and control will be divided in two parts:
1) Internal monitoring: will be lead by CESIE as part of its role as project coordinator. The internal
monitoring will aim to supervise the work of partners and give support, while ensuring that all milestones
are reached through a quality process. All partners will be actively involved in the internal monitoring,
contributing to the achievement of the results and outputs of this WP. Communication will be an
essential part of internal monitoring because it will ensure the transfer of information regarding the
project and the performance of partners, as well as prevent and/or resolve possible challenges. In case
of problems by one partner or among partners in the project performance or in the development of the
planned activities, CESIE will activate a plan consisting mainly in:
•giving permanent support for the realisation of the activities, analysing with the partner(s) the origin of
the problem and proposing solutions to it
•monitoring the implementation of the possible solutions and their results
•involving all the Consortium to ensure other point of views and good practices to overcome the
problems
•foreseeing alternative solutions, informing and asking for support to the EC in case of need.
2) External monitoring: The grantholder will subcontract an external evaluator who will contribute to the
quality of work and the Consortium. The external evaluator will be in charge of
•monitoring all the activities at local and international levels;
•creating and delivering tools for the assessment of the quality of work and the impact of activities
(training and coordination events);
•developing annual reports based on the results of the evaluation activities;
Joint Master in Information Security and Data Management / (ISDM)
Page 25 of 54
PART G - Impact, dissemination and exploitation, sustainability
G.1. Expected impact of the project
Please explain who will use these project outputs / products / results and how the consortium will reach
them. Describe how the target groups (including participating institutions, stakeholders) will be reached and
involved during the life of the project and how the project will benefit the target group at local, regional,
national and or European level. Please structure your description according to the different levels of impact
and stakeholders (limit 3000 characters).
The main outcome of this project is the development of a model of a joint MSc in Information Security
curriculum that well suites universities in the region and has the unique elements of e-learning, industrial
tutorials, distributed team work and joint thesis supervision. Successful exploitation of this curriculum in
the partner universities is a core and integral part of the project is allocated considerable resources.
Partner country universities all lack a similar a degree and are in bad need of one. They will implement
the curriculum by obtaining the required approvals and running the first round of the programme. This
will pave the way for other universities to model this programme or join the consortium for joint
deployment and implementation.
Central to our curriculum philosophy, design and implementation is sustainability. Sustainability activities
are designed to ensure that partner country institutions are committed, and have the ability, to continue
the implementation of the outcomes of the Project after funding comes to an end. Particularly, the
Project will produce the following outcomes which will ensure the sustainability of results:
a. The new Master in information security programme with its newly prepared teaching model and
materials will be included in the regular programmes of the participating universities and offered yearly;
b. The developed programme should be continually kept evolvable to meet advances and evolution in
the subject area. At the heart of our design, and to handle such co-evolution, will be the introduction of
“” modules. The contents of such modules will change regularly taking into account current development
in the subject area and local needs.
c. Carefully defined evolvable industrial case studies will be an integral part of the modules developed in
this program.
d. Some, if not all, of the modules within the developed programme will be appropriately packaged and
be offered as industrial training, hence serving local industrial needs.
e. The staff needed to teach the programme in partner universities will be trained, retrained and
updated;
f. Equipment, books and software will be in place for the continuation of the new programmes
g. Improved understanding of the Bologna process (through the establishment of the two programmes,
seminars on the promotion of the Bologna process and the visit of senior members of universities to EU
countries) in partner countries will facilitate its eventual adaptation.
Finally, dissemination of the outcomes to all relevant stakeholders will contribute to the sustainability of
the project results and the ultimate success of ISIM Project. This will be achieved by reaching all possible
targets groups and informing them of the project and encouraging them to participate in its activities.
Stakeholders of this project are the students and staff of partner country universities; companies in the
field, employers of these students; administrative staff of the universities and Ministries of Education.
Workshops will be organized and dissemination materials (CDs, brochures, website) to disseminate all
the relevant information to other faculties and departments of each university as well as to stakeholders
outside the universities.
Joint Master in Information Security and Data Management / (ISDM)
Page 26 of 54
Please describe how the target groups (including participating institutions, stakeholders) will be reached
after the project is finished (limit 3000 characters).
The master programme will be run at the two partners universitues as a joint MSc programme and
continue recruiting new studnts from different universities in Palestine.
Overview of short and long term impact indicators
Please add rows as necessary according to indicators
☒
Target
Short term impact
groups/potential
Quantitative indicators
beneficiaries
Long term impact
Target
groups/potential
beneficiaries
Quantitative indicators
Qualitative indicators
Qualitative indicators
G.2. Dissemination and exploitation strategy
Please explain how the dissemination will be organised and how exploitation activities will ensure optimal
use of the results within the project's lifetime and after. Explain the roles, responsibilities and target groups
(limit 3000 characters).
The project will be promoted according to a dissemination strategy that will be carried out mostly by the
academic and administrative staff of the project at PTUK University in cooperation with other partners in
two ways:
• Disseminate the project results to all members inside the consortium
• Disseminate the project results outside the consortium in Palestine and the region
The dissemination of knowledge and results within the consortium will be achieved through progress
reports, meetings and minutes . The project website will be a major dissemination tool. A part of this
project website will be allocated for internal use by the project members and project monitoring bodies if
required with communications including file exchange and discussion forums. Furthermore, the project
reports will mainly be for internal circulation within the consortium and monitoring bodies in order to
keep all members up to date about the progress of the project.
As for dissemination outside the project consortium, a website for the project will be established and
launched to the public at the beginning of the first year the project which will report on the project's
intermediate outcomes and events. Links to other relevant websites will also be established which may
include in addition to partners websites, other Palestinian universities. Palestinian Ministry of Higher
Education, other ministries and governmental organizations and engineering organizations.
Other dissemination materials such as brochures, posters, and leaflets will be designed and printed in
both Arabic and English. These materials will be distributed to all potentially interested parties in the
project, the developed programme and research facilities including universities, ministries, engineering
Joint Master in Information Security and Data Management / (ISDM)
Page 27 of 54
industry and organizations.
G.3. Sustainability
Explain how the impact of this project will be sustained beyond its lifetime. Please list the outcomes that you
consider sustainable and describe the strategy to ensure their long lasting use beyond the project's life financially, institutionally and policy level. Also explain how the results will be mainstreamed and multiplied
in the sector of activity and in the participating institutions. Describe the strategy foreseen to attract cofunding and other forms of support for the project (limit 2000 characters).
The project exploitation activities are planned to ensure sustainability of the proposed programme and
associated research facilities beyond the lifetime of the project. These activities are:
- Accreditation of the programme by the Palestinian Ministry of Higher Education to ensures the
institutional sustainability of the programme.
- Lecturers at PTUK University who were trained during the project will be capable of carrying out the
teaching and supervision of graduate project. They will continue to use the teaching and course
materials designed and reviewed during the project
- Equipment and simulation packages for the programme laboratory and projects will be purchased using
the project funds. In addition, a list of books will be purchased to establish a core specialized library for
the programme
- The success of the programme in its first year of implementation will be an important factor in
preluding for a continuous cooperation in the future with the European partners. The academic staff at
Birzeit University will discuss the possibility and requirements of bilateral cooperation with EU partner
institutions where EU academics may be appointed as visiting Professors at Bizeit to continue teaching on
the programme for the seeable future.
-- Other activities will serve as an opening for future cooperation of the consortium members in
conducting joint research projects, publications and exchange of visits.
- The project is expected to strengthen the links between Palestinian universities, engineering industry
and organizations and the Government.
Joint Master in Information Security and Data Management / (ISDM)
Page 28 of 54
LOGICAL FRAMEWORK MATRIX – LFM
Wider Objective: ☒
Indicators of progress:
What is the overall broader objective, to which the
project will contribute?
What are the key indicators related to the wider
objective?
What are the sources of information on these
indicators?
Specific Project Objective/s:
Indicators of progress:
How indicators will be measured:
What are the specific objectives, which the project
shall achieve?
What are the quantitative and qualitative indicators
showing whether and to what extent the project’s
specific objectives are achieved?
What are the sources of information that exist and can What are the factors and conditions not under the
be collected? What are the methods required to get
direct control of the project, which are necessary to
this information?
achieve these objectives? What risks have to be
 Brochures of Joint Master Degree in considered?
 The project main aim is the capacity
building of the faculty members
through developing and implementing
a Joint MSc degree in Information
Security and Data Management with
the Partners Universities, consistent
with EU. The project will foster the
transfer of state-of-the-art knowledge
and best practices from Europe to
Palestine
 a. The development of the
proposed MSc program's curriculum in
cooperation with the partner
universities.
 b. Capacity building of Palestinian
and Jordanian academic staff by
training a number of the teaching staff
to become the teaching core of the
newly established MSc program.
 c.
Equipping laboratories to be
utilized by graduates during their
studies
 d. Establish links with Palestinian,
Jordanian and European local industry
to provide ideas of relevant MSc
How indicators will be measured:
 Development, validation and
implementation of the MSc Program
 Periodical reviews from
consultations with: students, recently
graduated students, and management
of enterprises on the territory covered
by beneficiary institutions.
 Participation of industry to project’s
events (validation, workshops,
conferences, offers of student
placements)
 nterest of the economic market and
information security and IT
management.
•
Best practice guide for
preparing and teaching e-Learning
courses has been written.
•
Starting the joint Masters
Degree in information security and IT
management after being approved by
Palestinian Ministry of Higher
Education.
•
Co-supervision of students’
theses with EU universities
•
Organization of seminars on
the Bologna System
•
Expert involvement in the
development of the M.Sc. curriculum
 By evaluation of discussion,
questionnaires and interviews that will
be periodically presented. The quality
of graduated students assessed by
employers (but only after a project
implementation).
 Number of external organizations
(Industry, Academic and Public Sector)
participating to project’s events.
information security and IT
management.
 Establishment of project web site in
PTUK with customized access to
teaching/project material for internal
and external organizations.
 The new MSc in information security
and IT management is announced and
included in the regular study Programs
of universities.
 Reports of staff completing updating
visits in EU universities
 Number of participants in the
Joint Master in Information Security and Data Management / (ISDM)
Page 29 of 54
Assumptions & risks:
 Cooperation among partner
universities for joint development and
teaching of the MSc program.
 Approval of the new Joint Master
Degree in information aecurity by
University and Accreditation Agencies
in partner countries.
 Continuation of the support of the
University authorities for the Project
in partner countries.
 Participation of students

projects and placements for graduates (also against the level of compliance
with the Bologna Framework)
 e. MSc modules to be taught
jointly by staff members from Local
•
Industry participation to the
and European institutions during the
courses’ definition and
implementation stage
implementation
 f.
Staff members from the

consortium will embark on joint
research in areas of common interest.
This includes the supervision of MSc
students’ projects.
 g.
Improving the management
skills of Data Centers in Palestinian
and Jordanian institutions.

Outputs (tangible) and Outcomes
Indicators of progress:
What are the indicators to measure whether and to
(intangible):
 Please provide the list of concrete DELIVERABLES outputs/outcomes (grouped in Workpackages),
leading to the specific objective/s.:
(Preparartion)
WP1 Exploration of EU teaching and
research practises, preparing the
roadmap for the project and
development of joint working
protocols .
WP Leader (MU)
Activities:
- A1.1 Plan and Assess the needs for
the information management
- A1.2 Plan and assess the needs of
security
- A1.3 Kick-off Meeting Preparation
- A1.4 Organize study tour to the EU
partners universities
(Development)
what extent the project achieves the envisaged results
and effects?
•
Models of joint M.Sc. Programs
implementing the Bologna framework
and its future developments have
been identified
•
Principles and Guidelines to
establish a joint M.Sc. program have
been developed
•
industry advisory board are
formulated
•
Senior staff from partner
country universities visiting EU
universities
•
Preparation of the new Mater
structures and modules
•
Production of the Best Practice
Guide to develop and deliver eLearning courses.
•
Staff undertaking updating
Bologna system workshops
 Number of students enrolled on MSc
in information security Program in its
first run.
 Number of students visiting EU
universities for joint thesis
supervision.
 Reports of students completing
study periods in EU universities
 Workshops/conferences at the end
of every year

How indicators will be measured:
Assumptions & risks:
What are the sources of information on these
indicators?
What external factors and conditions must be realised
to obtain the expected outcomes and results on
schedule?
•
Reports of staff on updating
visits
•
Students accomplished their
Master dissertation.
•
Brochures of new Joint Degree
in Information security and IT
management and Study Guides
produced by universities.
•
Reports of EU staff on teaching
and training activities
•
Libraries of universities are
supplied with the books, journals and
teaching materials
•
Equipment has been bought
and installed at the partner country
universities to establish the teaching
laboratories.
•
Web sites, leaflets and
Joint Master in Information Security and Data Management / (ISDM)
Page 30 of 54
•
Continued interest of partner
country teaching staff in updating
visits to EU universities
•
Availability of EU staff to
undertake teaching in the partner
countries
•
EU universities remaining
interested in hosting students form
partner universities to undertake
study periods in their side.
•
Speedy appointment of local
coordinators and local administrators
and arrangements for banking in
partner countries
•
Continued willingness of
partner country universities to learn
about the Bologna system
•
Risks due relating to possible
WP2 Program and Curriiculum Design
WP Leader (HUA)
- A2.1 Workshops for the program
design and outline
- A2.2 Organise a study tour to HUA
university
- A2.3 Developing Data Management
Courses and tutorials
- A2.4 Developing Courses in
Information Security
- A2.5 Developing courses for
information privacy and ethics
- A 2.6 Organising a study tour to EU
UNiversity.
- A2.7 Developing courses in
computer forensics.
- A2.8 Developing elective courses.
(Preparation)
WP3 Preparation and Accreditation
WP Leader (PTUK)
- A3.1 Preparing the required
documents for the accrediation
process
- A3.2 Preparing for the Computer
Security Labs
- A3.3 Organize a study tour to the EU
universities
- A3.4 Bids and installation of the
required equipments and softwares
visits
•
Teaching visits by EU professors
•
Evaluation and validation of
Program by PC
•
Students from partner country
unversities undertaking study periods
in the EU
•
Spending on equipment &
books
•
Setting up project web site
•
Distribution of Project
Newsletter
•
Dissemination of Project
activities
•
Inclusion of the Joint Degree in
Software Enginnering in regular
university Programs
•
Establishment of planning and
monitoring meetings
•
Quality of project’s output and
outcomes is periodically evaluated and
achieved
•
Reports by External Evaluator
•
Formation of Steering Group
•
Appointment of local
coordinators and local administrators

newsletter produced for dissemination upheaval/war in the territory
•
Intermediate and Final reports 
of the Project
•
Workshop and conference
proceedings (on-line and printed)

(Quality)
WP 4 Quality Control
WP Leader (CESIE)
- A4.1 Prepare quality plan for both
Joint Master in Information Security and Data Management / (ISDM)
Page 31 of 54
Internal and external monitoring
- A4.2 Quality of Management and
Governance- proposed assessment
criteria and indicators
(Exploitation and Dissimination
WP5 Project Dissimination and
Exploitation
WP Leader (HUA)
- A5.1 Develop Web Portal with web
2.0 functionalities
- A5.2 Publish Leaflets
- A5.3 Organise National workshops
and raise awarness of the Program
(Management)
WP6 Project Management
WP Leader (PTUK)
- A6.1 Attending "Erasmus plus
projects representatives meetings"
A6.2 Formation of the steeing Group
- A6.3 Organising the Kick-off meeting
- A6.4 Financial and administrative
management
- A6.5 Production of intermediate and
final reports.
Joint Master in Information Security and Data Management / (ISDM)
Page 32 of 54
Activities:
Inputs:
What are the key activities to be carried out (grouped
in Workpackages) and in what sequence in order to
produce the expected results?
What inputs are required to implement these activities,
e.g. staff time, equipment, mobilities, publications
etc.?
 Preparartion)
 WP1 Exploration of EU teaching and
research practises, preparing the
roadmap for the project and
development of joint working
protocols .
 WP Leader (MU)
 Activities:
 - A1.1 Plan and Assess the needs for
the information management
 - A1.2 Plan and assess the needs of
security
 - A1.3 Kick-off Meeting Preparation
 - A1.4 Organize study tour to the EU
partners universities

 (Development)
 WP2 Program and Curriiculum
Design
 WP Leader (HUA)
 - A2.1 Workshops for the program
design and outline
 - A2.2 Organise a study tour to HUA
university
 - A2.3 Developing Data Management
Courses and tutorials
 - A2.4 Developing Courses in
Information Security
 - A2.5 Developing courses for
information privacy and ethics
 - A 2.6 Organising a study tour to EU
 The total number of working days
dedicated to the project is 384 days in
category 1 and 1450 days in category
2 and 200 in category 3 and 510 in
category 4 plus in manpower
dedicated to the project by partner
universities under co-financing rule.
•
The following equipment will
be purchased to establish a software
engineering lab in each partner
country:
 1. Interactive white board (smart
board) for teaching room;
 2. 30 PCs for Computer laboratory
for students;
 3. Software tools and packages
 4. Laptop computer for use with
LCD projector;
 5. LCD projector for teaching
room;
 6. Heavy duty printers for
Computer Laboratory;
 7. Server in each partner country
to support the e-Learning platform;
 8. Contribution towards cost of
video conference equipment.
•
A total of 392 days of mobility
will be achieved to accomplish the
project objectives (from EU to partner
countries and the other way)
•
The following items will be
published and distributed:
Joint Master in Information Security and Data Management / (ISDM)
Page 33 of 54
Assumptions, risks and preconditions:
What pre-conditions are required before the project
starts? What conditions outside the project’s direct
control have to be present for the implementation of
the planned activities?
•
Continuation of relative
political stability and social peace in
each partner country
•
Continuation of friendly
relationships between the six partner
countries universities and universities
in the EU
•
Universities in each country
remaining willing to cooperate with
each other and working together
•
Any change in the
management of universities and
faculties will not adversely affect their
support for the Project

UNiversity.
 - A2.7 Developing courses in
computer forensics.
 - A2.8 Developing elective courses.

 (Preparation)
 WP3 Preparation and Accreditation
 WP Leader (PTUK)
 - A3.1 Preparing the required
documents for the accrediation
process
 - A3.2 Preparing for the Computer
Security Labs
 - A3.3 Organize a study tour to the
EU universities
 - A3.4 Bids and installation of the
required equipments and softwares

 (Quality)
 WP 4 Quality Control
 WP Leader (CESIE)
 - A4.1 Prepare quality plan for both
Internal and external monitoring
 - A4.2 Quality of Management and
Governance- proposed assessment
criteria and indicators

 (Exploitation and Dissimination

 WP5 Project Dissimination and
Exploitation
 WP Leader (HUA)
 - A5.1 Develop Web Portal with web
2.0 functionalities
 1. Training materials about
Bologna system.
 2. Teaching materials for the MSc
program
 3. Website setting
 4. Publicity brochures and CD.
 5. Other necessary reports,
surveys, etc.
•
External experts will subcontracted for project external
evaluation and QA.
•
Textbooks on information
security and IT mangement of value
25,000 Euro will be obtained for
libraries in the partner country
universities.

Joint Master in Information Security and Data Management / (ISDM)
Page 34 of 54
 - A5.2 Publish Leaflets
 - A5.3 Organise National workshops
and raise awarness of the Program

 (Management)
 WP6 Project Management
 WP Leader (PTUK)
 - A6.1 Attending "Erasmus plus
projects representatives meetings"
 A6.2 Formation of the steeing Group
 - A6.3 Organising the Kick-off
meeting
 - A6.4 Financial and administrative
management
 - A6.5 Production of intermediate
and final reports.

Joint Master in Information Security and Data Management / (ISDM)
Page 35 of 54
WORKPLAN
Please use the model provided. Applicants are expected to complete a one-page work plan for each project year.
For each year of your project proposal, please complete a work plan indicating the deadlines for each outcome and the period and location in which your activities
will take place. Please create additional work plan tables if further space is needed.
The same reference and sub-reference numbers as used in the logical framework matrix must be assigned to each outcome and related activities.
Activity carried out in the Programme Country:
Activity carried out in the Partner Country (ies):
= (E.g. activity in France for two weeks in the first month of the project 2= under M1)
X (E.g., activity in Tunisia for three weeks in the second month of the project: 3X under M2)
WORKPLAN for project year 1 ☒
Activities
Ref.nr/
Sub-ref
nr
1.1
1.2
1.3
1.4
2.1
2.2
2.3
2.4
2.5
2.6
2.7
2.8
2.9
Title
Plan and Assess the needs for the information
management
Plan and assess the needs of security
Kick-off Meeting Preparation
Organize study tour to the EU partners universities
Workshops for the program design and outline
Organise a study tour to HUA university
Developing Data Management Courses and tutorials
Developing Courses in Information Security
Prepare quality plan for both Internal and external
monitoring
Quality of Management and Governance- proposed
assessment criteria and indicators
Attending "Erasmus plus projects representatives
meetings"
Formation of the steering Group
Financial and administrative management
Total
duration
(number
of weeks)
M1
8
8X
8
4
2
4
2
12
12
M2
M3
M4
M5
M6
M9
M10
M11
M12
8X
2
4X
2
12X
12x
3
3
1
4
M8
4X
3
1
M7
3
1
1X
1X
1X
Joint Master in Information Security and Data Management / (ISDM)
Page 36 of 54
1X
2X
WORKPLAN for project year 2 ☒
Activities
Ref.nr/
Sub-ref
nr
2.10
2.11
2.12
2.13
3.1
3.2
3.3
3.4
5.1
5.2
5.3
6.1
6.2
Title
Developing courses for information privacy and
ethics
Organising a study tour to EU University
Developing courses in computer forensics
Developing elective courses
Preparing the required documents for the
accreditation process
Preparing for the Computer Security Labs
Organize a study tour to the EU universities
Bids and installation of the required equipment and
software
Develop Web Portal with web 2.0 functionalities
Publish Leaflets
Organise National workshops and raise awareness
of the Program
Attending "Erasmus plus projects representatives
meetings"
Financial and administrative management
Total
duration
(number
of weeks)
M1
12
12X
2
12
12
M2
M3
M4
M5
M6
M7
M8
M9
M10
M12
2
12X
12X
8
8X
4
2
4X
2
4
4X
16
4
16X
4X
6
1
M11
6X
1
4
1X
1X
Joint Master in Information Security and Data Management / (ISDM)
Page 37 of 54
1X
1X
WORKPLAN for project year 3 ☐
Activities
Ref.nr/
Sub-ref
nr
5.1
6.1
6.2
6.3
Total
duration
(number
of weeks)
Title
Start the classes teaching
Attending "Erasmus plus projects representatives
meetings"
Financial and administrative management
Production of intermediate and final reports
M1
32
1
M2
M3
M4
M5
M6
M7
M8
M9
M10
M11
M12
1X
2X
2
4X
1X
2
32X
1
4
10
1X
1X
Joint Master in Information Security and Data Management / (ISDM)
Page 38 of 54
PART H - Work packages
Please enter the different project activities you intend to carry out in your project. Make sure that the
information in this section is consistent with the project Logical Framework Matrix.
H.1. Description of work packages, outcomes and activities
Work package type
and ref.nr ☒
PREPARATION
1
Exploration of EU teaching and research practices and development of joint
working protocols
Title
Related assumptions
and risks
Plan and assess the needs for information management
The Palestinian and Jordanian needs for information management will be
specified with an active involvement of the partners from public and private
sectors. These needs will be prepared in in month 3. (Deliverable 1.1)
Description
Estimated Start Date
(01-10-2015)
- A1.1 Plan and Assess the needs for the information management
- A1.2 Plan and assess the needs of security
- A1.3 Kick-off Meeting Preparation
- A1.4 Organize study tour to the EU partners universities
Estimated End Date
(30-03-2016)
Lead Organisation
MU
Participating
Organisation
PTUK, MU, CESIE, HUA, AAUJ, and HU
Tasks
Deliverables/results/outcomes
Expected
Deliverable/Results/
Outcomes
Work Package and
Outcome ref.nr
Title
Type
1.1.
☐ Teaching material
☐ Learning material
☐ Training material
Description
Due date
30-03-2016
Languages
English
☒ Event
☒ Report
☐ Service/Product
Target groups
☐ Teaching staff
☐ Students
☐ Trainees
☒ Administrative staff
☐ Technical staff
☐ Librarians
☐ Other
If you selected 'Other', please identify these target groups.
(Max. 250 characters)
Dissemination level
☒ Department / Faculty
☒ Institution
☒ Local
☒ Regional
☒ National
☒ International
Joint Master in Information Security and Data Management / (ISDM)
Page 39 of 54
Please copy and paste tables as necessary.
Work package type
and ref.nr ☒
Title
DEVELOPMENT
2
Program and Curriculum Design
Related assumptions
and risks
Estimated Start Date
(1-5-2016)
The output of this working package is a complete document to be submitted to
the Ministry of Higher Education for an MSc program.
-A2.1Workshops for the program design and outline
- A2.2 Organise a study tour to HUA university
- A2.3 Developing Data Management Courses and tutorials
- A2.4 Developing Courses in Information Security
- A2.5 Developing courses for information privacy and ethics
- A 2.6 Organising a study tour to EU University.
- A2.7 Developing courses in computer forensics.
- A2.8 Developing elective courses.
Estimated End Date
(30-4-2017)
Lead Organisation
HUA/AAUJ
Participating
Organisation
PTUK, MU, CESIE, HUA, AAUJ, and HU
Description
Tasks
Deliverables/results/outcomes
Expected
Deliverable/Results/
Outcomes
Work Package and
Outcome ref.nr
Title
Type
Description
Due date
2.1.
☒ Teaching material
☒ Learning material
☐ Training material
☒Event
☒ Report
☐ Service/Product
30-4-2017
Languages
Target groups
☒ Teaching staff
☐ Students
☐ Trainees
☒ Administrative staff
☐ Technical staff
☒ Librarians
☐ Other
If you selected 'Other', please identify these target groups.
(Max. 250 characters)
Dissemination level
☒ Department / Faculty
☒ Institution
☒ Local
☒ Regional
☒ National
☐ International
Please copy and paste tables as necessary.
Joint Master in Information Security and Data Management / (ISDM)
Page 40 of 54
Work package type
and ref.nr ☐
Title
Preparation
3
Preparation and Accreditation
Related assumptions
and risks
Description
Estimated Start Date
(1-4-2017)
- A3.1 Preparing the required documents for the accreditation process
- A3.2 Preparing for the Computer Security Labs
- A3.3 Organize a study tour to the EU universities
- A3.4 Bids and installation of the required equipment and software
Estimated End Date
(1-10-207)
Lead Organisation
PTUK
Participating
Organisation
PTUK, MU, CESIE, HUA, AAUJ, and HU
Tasks
Deliverables/results/outcomes
Expected
Deliverable/Results/
Outcomes
Work Package and
Outcome ref.nr
Title
Type
Description
Due date
3.1.
☐ Teaching material
☐ Learning material
☐ Training material
☐ Event
☐ Report
☒ Service/Product
1-10-2017
Languages
Target groups
☐ Teaching staff
☐ Students
☐ Trainees
☒ Administrative staff
☒ Technical staff
☐ Librarians
☐ Other
If you selected 'Other', please identify these target groups.
(Max. 250 characters)
Dissemination level
☒ Department / Faculty
☒ Institution
☒ Local
☐ Regional
☐ National
☐ International
Please copy and paste tables as necessary.
Work package type
and ref.nr ☒
Title
Quality
4
Quality Control
Related assumptions
and risks
Description
This work package will be initiated with the project start and ends after the
closing ceremony.
Joint Master in Information Security and Data Management / (ISDM)
Page 41 of 54
Estimated Start Date
(1-5-2017)
- A4.1 Prepare quality plan for both Internal and external monitoring
- A4.2 Quality of Management and Governance- proposed assessment criteria
and indicators
Estimated End Date
(30-9-2018)
Lead Organisation
CESIE
Participating
Organisation
PTUK, MU, CESIE, HUA, AAUJ, and HU
Tasks
Deliverables/results/outcomes
Work Package and
Outcome ref.nr
Title
Expected
Deliverable/Results/
Outcomes
4.1.
☐ Teaching material
☐ Event
☐ Learning material
☐ Report
☐ Training material
☒ Service/Product
Every deliverable will follow the quality standards put in
this working package.
30-9-2018
Type
Description
Due date
Languages
Target groups
☒ Teaching staff
☒ Students
☒ Trainees
☒ Administrative staff
☒ Technical staff
☒ Librarians
☐ Other
If you selected 'Other', please identify these target groups.
(Max. 250 characters)
Dissemination level
☒ Department / Faculty
☒ Institution
☐ Local
☐ Regional
☐ National
☐ International
Please copy and paste tables as necessary.
Work package type
and ref.nr ☒
Title
Exploitation and Dissemination
5
Project Dissemination and Exploitation
Related assumptions
and risks
Description
Tasks
Estimated Start Date
(1-10-2015)
- A5.1 Develop Web Portal with web 2.0 functionalities
- A5.2 Publish Leaflets
- A5.3 Organise National workshops and raise awareness of the Program
- A5.4 Teaching
- A5.5 Students and advisors mobility
Estimated End Date
(30-9-2018)
Joint Master in Information Security and Data Management / (ISDM)
Page 42 of 54
Lead Organisation
HUA
Participating
Organisation
PTUK, MU, CESIE, HUA, AAUJ, and HU
Deliverables/results/outcomes
Expected
Deliverable/Results/
Outcomes ☒
Work Package and
Outcome ref.nr
Title
Type
Description
Due date
5.1.
☐ Teaching material
☐ Learning material
☐ Training material
☒ Event
☐ Report
☒ Service/Product
30-9-2018
Languages
Target groups
Dissemination level
☒ Teaching staff
☒ Students
☐ Trainees
☒ Administrative staff
☒ Technical staff
☐ Librarians
☐ Other
If you selected 'Other', please identify these target groups.
(Max. 250 characters)
☒ Department / Faculty ☒ Local
☒ National
☒ Institution
☐ Regional
☐ International
Please copy and paste tables as necessary.
Work package type
and ref.nr ☒
Title
Management
Project Management
Related assumptions
and risks
Description
Estimated Start Date
(1-10-2015)
- A6.1 Attending "Erasmus plus projects representatives meetings"
- A6.2 Formation of the steering Group
- A6.3 Organising the Kick-off meeting
- A6.4 Financial and administrative management
- A6.5 Production of intermediate and final reports.
Estimated End Date
(30-9-2018)
Lead Organisation
PTUK
Participating
Organisation
PTUK, MU, CESIE, HUA, AAUJ, and HU
Tasks
Deliverables/results/outcomes
Joint Master in Information Security and Data Management / (ISDM)
Page 43 of 54
6
Expected
Deliverable/Results/
Outcomes ☒
Work Package and
Outcome ref.nr
Title
Type
Description
Due date
6.1.
☐ Teaching material
☐ Learning material
☐ Training material
☒ Event
☒ Report
☒ Service/Product
30-9-2018
Languages
Target groups
Dissemination level
☐ Teaching staff
☐ Students
☐ Trainees
☒ Administrative staff
☐ Technical staff
☐ Librarians
☐ Other
If you selected 'Other', please identify these target groups.
(Max. 250 characters)
☐ Department / Faculty ☐ Local
☐ National
☒ Institution
☐ Regional
☒ International
Joint Master in Information Security and Data Management / (ISDM)
Page 44 of 54
H.2. Explanation of work package expenditures
Please explain what costs will be associated to each work package and covered by lump sums, flat
rates, unit costs, and real costs. Provide information on the travels necessary to complete the
workpackage. Detailed information on each travel must be indicated in the Budget Excel table. If
purchase of equipment is required, explain how the respective equipment addresses the needs
identified in the project. Remember that the specification of each item, including the partner country
university/ies at which equipment will be installed, must be detailed in the Budget Excel table. If any
subcontracting is considered necessary for the implementation of the project, please explain why the
task cannot be performed by the consortium members themselves (limit 3000 characters).
If your project involves a Special Mobility Strand, please explain what support will be required under
each budget heading in order to cover organisational costs (such as special needs, exceptional, nononline linguistic support, etc.) (limit 2000 characters).
In the special mobility strand, students and their supervisors will visit UK to be involved in research in
addition to measure security and data management practices. This needs them to visit real data centers
which have real security cases.
Joint Master in Information Security and Data Management / (ISDM)
Page 45 of 54
H.3 Consortium partners involved and resources required to complete the work package
Indicative input of consortium staff - The total number of days per staff category should correspond with the information provided in the budget tables.
Work Package
Ref.nr
Partner
nr
Partner
acronym
Number of staff days1 ☒
Country
Role and tasks in the work package
Category
1
PREPARATION
P1
P2
P3
P4
P5
P6
PTUK
HCU
MU
CESIE
AAUJ
HU
Palestine
Greece
UK
Italy
Palestine
60
8
6
8
25
Category
2
Category
3
35
10
10
10
35
Palestine
10
0
0
0
10
5
Category
4
Total
40
5
5
40
5
5
SUBTOTAL
DEVELOPMENT
SUBTOTAL
QUALITY PLAN
SUBTOTAL
DISSEMINATION &
EXPLOITATION
SUBTOTAL
MANAGEMENT
1 Please see Programme Guide, Part B for your action, Table A – Project Implementation (amounts in Euro per day) Programme Countries and Table B - Project
Implementation (amounts in Euro per day) Partner Countries.
Joint Master in Information Security and Data Management / (ISDM)
Page 46 of 54
SUBTOTAL
TOTAL
Please insert rows as necessary
Joint Master in Information Security and Data Management / (ISDM)
Page 47 of 54
Subcontracting of tasks to external bodies should be very occasional. The specific competences and particular expertise needed to reach the project
objectives should be found in the consortium and should determine its composition. Subcontracting is intended for specific, time-bound, project-related
tasks which cannot be performed by the Consortium members themselves.
Tasks that will be subcontracted:
Work
Package
Ref.nr
Partner
responsible
for subcontracting
(Acronym)
Country
Number of
days (where
appropriate)
Brief description of task ☒
Please insert rows as necessary.
Joint Master in Information Security and Data Management / (ISDM)
Page 48 of 54
PART I – Special Mobility Strand
Applies ONLY to cooperation projects with partner countries from REGIONS 1, 2 and 3
Projects may organise mobility activities of students, researchers and staff so far as they
support/complement the other activities of the Capacity Building project and bring added value in
the realisation of the project's objectives. Mobility activities do not constitute the main activities for
Capacity Building.
I.1. Relevance of mobility activities
Please describe what kind of mobility activities are foreseen in the Special Mobility Strand, what are
their objectives and expected results. Explain how the mobility activities of students, researchers and
staff support/complement the other activities of the Capacity Building and bring added value in the
realisation of the project's objectives (limit 3000 characters).
I.2. Identification and selection of the participants
Please describe the procedures set up for identification and selection of participants for the mobility
activity (limit 1000 characters).
I.3. Preparation and support
Please describe the structure for preparation of the participants for the mobility activity, including
specific training or course, linguistic preparation etc. Please explain the support provided in terms of
accommodation, insurances, etc. Please explain the quality measures set up in the sending and
receiving organisations for monitoring the mobility activity and measures to be taken if the results
foreseen are not met (limit 2000 characters).
I.4. Involvement of people with fewer opportunities
Does your project involve people with fewer opportunities?
☐ YES ☒ NO
IF YES, how many participants coming from which countries and organisations would fall under this
category? Specify the type of situation of fewer opportunities these participants are facing (limit 2000
characters).
Please explain the nature of the support required and how it will be addressed, so that these persons
can fully engage in the foreseen activities (limit 1000 characters).
Joint Master in Information Security and Data Management / (ISDM)
Page 49 of 54
I.5. Recognition and validation of learning outcomes
Please explain how the project intends to recognise and validate the teaching and/or learning
outcomes of the participants (limit 1000 characters).
N/A
Joint Master in Information Security and Data Management / (ISDM)
Page 50 of 54
PART J - OTHER EU GRANTS
Please list the projects for which the organisations involved in this application have received financial
support from EU programmes.
Programme or
initiative
DG EAC Tempus IV VI Call
[SMGR]
543711-TEMPUS-12013-1-AMTEMPUS-SMGR
DG EAC Tempus IV VI Call
[JPCR]
543651-TEMPUS-12013-1-AT-TEMPUSJPCR
Technische
Universität Wien
DG EAC Tempus IV VI Call [SMGR]
544125-TEMPUS-12013-1-AMTEMPUS-SMGR
Yerevan State
University, YSU
DG EAC Tempus IV VI Call
[SMGR]
544302-TEMPUS-12013-1-DE-TEMPUSSMGR
University of KoblenzLandau [UKOLD]
DG EAC Tempus IV V Call
[SMHES]
DG EAC Tempus IV V Call
[JPCR]
530321-TEMPUS-12012-1-AMTEMPUS-SMHES
530311-TEMPUS-12012-1-AMTEMPUS-JPCR
Armenian State
University of
Economics
Armenian State
Pedagogical
University
DG EAC Tempus IV VI Call
[JPCR]
543651-TEMPUS-12013-1-AT-TEMPUSJPCR
Technische
Universität Wien
LLP - Grundtvig - MLP
LLP – Grundtvig MLP
LLP – Grundtvig MLP
Reference number
527488-LLP-1-20121-UK-GRUNDTVIGGMP
527744-LLP-1-20121-IT539784-LLP-1-20131-FR-GRUNDTVIG-
Beneficiary
Organisation
Yerevan State
Academy of Fine Arts,
YSAFA
Doncaster College
CESIE
Elan Interculturel
Title of the Project ☒
GOVERN
Development of State-of-the-art
Management System for Efficient
Structural Changes in Line with
Bologna Principles
SEHSI
Regional sustainable development
on the basis of eco-human
synergetic interaction
(multidisciplinary training course for
MSc, PhD and LLL students in
engineering)
PICASA
Promoting Internationalization of
HEIs in Eastern Neighbourhood
Countries through Cultural and
Structural Adaptations
ENCHASE
Enhancing Albanian System Of
Quality Assurance in Higher
Education: Application of the
Process- and Outcome-Based
Methodology
ARARAT - Armenian Coordination
Agency “UNIVERSITY – EMPLOYER”
MAHATMA - Master in Higher
Education management: developing
leaders for managing educational
transformation
SEHSI
Regional sustainable development
on the basis of eco-human
synergetic interaction
(multidisciplinary training course for
MSc, PhD and LLL students in
engineering)
LION - Learning, lIving, wOrking for
Neet-group
ALCE - Appetite for Learning Comes
with Eating
INSART - L'insertion des jeunes par
l'Art
Joint Master in Information Security and Data Management / (ISDM)
Page 51 of 54
LLP – Grundtvig MLP
LLP – Grundtvig MLP
GMP
540477-LLP-1-20131-IE-GRUNDTVIGGMP
540222-LLP-1-20131-SE-GRUNDTVIGGMP
South-East Regional
Authority - SERA
FIERE - Furthering Innovative and
Entrepreneurial Regions
Anders Ljungstedts
gymnasium
Mobility In Learning in Europe
LLP- KA2
531117-LLP-1-20121-SI-KA2-KA2MP
Spinaker
PROLANG - Promotion of Learning
Less Used European Languages to
Youth on the Move
LLP- Leonardo- TOI
2012-1-AT1-LEO0506967
Volkshochschule Tirol
TANDEM NOW
LLP- Leonardo- TOI
2012-1-PL1-LEO0527465
LLP-TOI
2013-1-GB2-LRO0510638
LLP- Leonardo- TOI
2012-1-FR1-LEO0534954
AGH – University of
Science and
Tecnology
University of
Gloucestershire
(e)VET2EDU Supporting Vocational
Teachers and Trainers in e-learning
VIPER
ADICE
Transfer of Administrative and
Pedagogical Tools useful to manage
mobility project
CESIE
Learning By Doing
Business Club
Austrialia
DEEP.Com goes Mobile (DCGM)
L1-359
CESIE
EYE VISION
C5-325474
SARETAS
EYE ENGAGED
LLP- Erasmus MLP
539439-LLP-1-20131-ES-ERASMUS-ESIN
INOVA+
DG Home Affairs CIPS / ISEC
HOME/2012/ISEC/A
G/THB
CISS
DG Home Affairs PPUAM
HOME/2012/PPUA
M/4113
Direzione Centrale
della Polizia Criminale
DG Justice DAPHNE
III - MLP
DG Justice DAPHNE
III – MLP
Open Society
Foundation (OSF)
JUST/2012/DAP/AG/
3273
JUST/2012/DAP/AG/
3049
LLP – Leonardo PLM
LLP- Grundtvig –
Accompanying
measures
Erasmus for young
entrepreneurs
Erasmus for young
entrepreneurs
LdV PLM2012-1-IT1LEO02-02559
527617-LLP-2012AT-GRUNDTVIGGAM
IN2SAI - Increasing Young Women's
Participation in Science Studies and
in the Aeronautic Industry
ROOT - Research On Organized
Trafficking Systems
VIGILA ET PROTEGE – To search and
protect unaccompanied minors
through the S.I.S. II – ‘fight against
invisibility’
Università di Coventry
Replace2
Exchange House
SUNIA GEEL 2
OR2014-13275
CESIE
Platform for voice
Erasmus+ KA2
Strategic Partnership
KA200-2014-006
KKU-Copenhagen
Youth School
SMART - Second Chance Schools
Working with Systematic
Measurement of Outcomes
Erasmus+ KA2
Strategic Partnership
2014-1-DE02KA204-001549
WBK Weiterbildungskolleg
Monchengladbach
(Germany)
DISCO - Digital Second Chance
Opportunities
Joint Master in Information Security and Data Management / (ISDM)
Page 52 of 54
Erasmus+ KA2
Strategic Partnership
2014-1FR01-KA204008762
Erasmus+ KA2
Strategic Partnership
Erasmus+ KA2
Strategic Partnership
2014-1-LT01-KA204000617-949677628
2014-1-PL01-KA204003037
ADICE
PC IMPRESS - Promotion and
Capitalization of International
Mobility Project to Reinforce
Employability and Sociability System
Social Innovation
Fund (Lithuania)
JOB-YES! Choose a job not a dole
ZDZ Katowice
Europa 50 plus
Erasmus+ KA2
Strategic Partnership
KA200-2014-010
Crossing Borders
(Denmark)
Erasmus+ KA2
Strategic Partnership
Erasmus+ KA2
Strategic Partnership
2014-1-AT01-KA201Kindervilla (Austria)
000977
2014-1-EL01-KA200- Active Citizens
001542
Partnership (Greece)
FETE - From Expats to
Experts:United Civil Society through
Inclusion and Empowerment of
Young Immugrants
POLYGLOT- Multilingual education
in preschool age
LangMOOC
Please insert rows as necessary.
Please list other grant applications submitted by your organisation, or by any partner organisation in
this project proposal. For each grant application, please mention the EU Programme concerned and
the amount requested.
Programme concerned
Beneficiary Organisation
Amount requested
Please insert rows as necessary.
Joint Master in Information Security and Data Management / (ISDM)
Page 53 of 54
CHECK LIST
Please make sure that you fully completed each part of this application form, as follows:
☐
☐
☐
☐
☐
☐
☐
PART D - Quality of the project team and the cooperation arrangements
PART E - Project characteristics and relevance
PART F - Quality of the project design and implementation
PART G - Impact, dissemination and exploitation, sustainability
☐
Logical Framework Matrix
☐
Workplan
PART H - Work packages
PART I – Special Mobility Strand (where applicable)
PART J - Other EU Grants
Joint Master in Information Security and Data Management / (ISDM)
Page 54 of 54