Application Form Selection: 2015 KA2 – Cooperation for innovation and the exchange of good practices – Capacity Building in the field of Higher Education Call for Proposal EAC/A04/2014 Joint Master in Information Security and Data Management / (ISDM) DETAILED DESCRIPTION OF THE PROJECT (To be attached to the eForm) Version 1 – 1.10.2014 Joint Master in Information Security and Data Management / (ISDM) Page 1 of 54 PART D - Quality of the project team and the cooperation arrangements D.1. Organisations and activities This part must be completed separately by each organisation participating in the project (applicant and partners). Partner number ☒ P1 Organisation name & Palestine Technical University Kadoorie acronym PTUK D.1.1 - Aims and activities of the organisation Please provide a short presentation of your organisation (key activities, affiliations, size of the organisation, etc.) relating to the area covered by the project (limit 2000 characters). Palestine Technical University- Kadoorie(PTUK) was established in 1930 as the first agricultural school in the region . The college widely participated in graduating specialists both in farm and animal production. In 1994, Palestinian National Authority took charge of the higher education system, the college was transformed into the technical field. After that the college was developed to give bachelor degrees in different specializations. In 2007 PTUK was accredited as the first technical governmental (state) university in Palestine with focus on engineering, applied sciences and business. PTUK is trying to integrate Entrepreneurial Learning in curriculum and to enhance partnership with enterprise and local market. The university adopted the MOHE strategy in Entrepreneurship as considered one priority in the 3 year plan. In terms of affiliations, PTUK has an outstanding reputation for projects funded by the World Bank , EC , FP7 and currently PTUK is a partner in a TEMPUS project (PalGOV). Palestine Technical University -Kadoorie (PTUK) is the only Technical- Governmental (State) University in Palestine. Its mission statement is "graduating highly qualified talented leaders with distinguished scientific, practical and research abilities enjoying practical capacity to carry out successful tasks that fulfil the private sector needs to compete so as to find suitable careers. The University is looking forward to start programs based on partnership with the private, public and governmental sectors to achieve development in economic and social fields". PTUK’s vision is to provide the Palestinian market as well the markets of the Arab neighboring countries with graduates who are well-oriented towards technical and applied fields in applied natural sciences, engineering, and information technology. Now, the University currently has about 6000 students (with almost 1:1 male-female ratio), and is expected to have approximately. The mission of PTUK has always been to bring graduates and services to the society, for the sake of development and welfare of the society. Accountancy and computerized information system are now active specializations in the advanced societies. Please describe also the role of your organisation in the project (limit 1000 characters). PTUK will lead and manage the whole process of the project and involve in the project launching. They will admininster all the financial operations. D.1.2 - Operational capacity: Skills and expertise of key staff involved in the project Please add lines as necessary. Summary of relevant skills and experience, including where relevant a list of Name of staff member recent publications related to the domain of the project. Dr. Eleyan has a good relevant diversity experience in academic and industry. Dr. Derar Eleyan I have a PhD in Information Systems and Msc in Business Information Joint Master in Information Security and Data Management / (ISDM) Page 2 of 54 Technology. Dr. Eleyan recently working as a Vice president for Admin and Financial affair at PTUK. He served five years as an assistant professor at Birzeit University in the Department of Computer Science teaching variety of courses at the undergraduate and postgraduate levels. He has worked also as lecturer and course team leader in computing at South East Essex college of Arts and Technology where he taught various modules as, information system, project management, database, web database, and website management, Computer and Business Ethics, Research methods. He has a good expertise as an Information Systems Consultant at BAS Computer Systems a private company since 2003 till 2006. On 2006, He was a visiting lecturer at the University of Manchester, teaching an MSc course of Enterprise System Modelling, collaborating with Prof. Loucopoulos. He has served as an external reviewer to some conferences in information science, information systems and business process modelling. His research interests focuses in System dynamics, software quality, Information Systems, Business Process Modelling, Customer service and satisfaction and return on investment, information technology management, IT project management, Quality of Service, Academic quality and performance evaluation, Business and computer ethics, Software testing quality assurance, Usability and ecommerce websites, Web decision systems. He is a member of some societies as British Computer Society (BCS), Institute for Learning (IFL), Systems Dynamics Society (SDS). Dr. Mutamed Khatib Dr. Nael Salman Dr. Mutamed Khatib received his B.Sc. degree in Telecommunication Engineering from Yarmouk University, Irbid, Jordan in 1996 and M.Sc. in Electrical and Electronic Engineering from Jordan University of Science and Technology, Irbid, Jordan in 2003. He received his PhD Degree in wireless and mobile systems from University Sains Malaysia (USM), Malaysia in 2009. From 1996 to 2005, he worked as Transmission, Outside Broadcasting and Studio Engineer in Palestinian Broadcasting Corporation (PBC). From 2005 to 2009 he worked as an Instructor in the Department of Electrical Engineering, Palestine Technical University (Kadoorie), Tul Karm, Palestine. Since September 2009, Dr. Mutamed Khatib is working as associate professor at the same university. Nowadays, he is the dean of college of engineering and technology there. Dr. Khatib has participated in many research projects and got many research grants from different sponsors such as Malaysian Ministry of Science, Technology and Innovation (MOSTI), Palestinian-American Research Center (PARC) and European Union (TEMPUS project). He has a number of publications to his credit in various international journals and conference proceedings. Dr. Nael SALMAN received his PhD in Computer Engineering from Middle Joint Master in Information Security and Data Management / (ISDM) Page 3 of 54 East Technical University (METU), Ankara, Turkey in 2006. He is an assistant professor in computer engineering at the department of Electrical and Computer Engineering at Palestine Technical University–Kadoorie(PTUK). Currently, Dr. Salman is the Dean of Community Service and Development Affairs. Dr. Salman started his job as a lecturer at PTUK in 1996. From 2000 to 2007 he worked as an instructor in the Department of Computer Engineering at Cankaya University, Ankara-Turkey. In January, 2007, Dr. Salman returned to Palestine where he rejoined PTUK and served as the head of the department of Electrical and Computer Engineering from Sep. 2010 to Feb. 2012. Dr. Salman has a number of publications in various international journals and refereed conference proceedings. He is also a program committee member of Software Engineering conference organized annually in Turkey. Dr. Salman also participated as an IT consultant in several TEMPUS, QIF funded projects. His research Interests include the fields of Software Engineering, Software measurement, Web Application development, Network security, and Database systems. Mr. Rami Debee Mr.Debee received the M.Sc degree form birzeit University in scientific computing since 2005, also he got his B.Sc degree from An-Najah University in electrical Engineering – computer branch .he is now working as a lecturer at Palestine technical university in the college of engineering and technology –computer engineering department .he is a cisco certified instructor and a trainer in the continuing education center , and he is active member in many organizations. Joint Master in Information Security and Data Management / (ISDM) Page 4 of 54 Partner number ☒ P2 Organisation name & HAROKOPIO UNIVERSITY acronym HUA D.1.1 - Aims and activities of the organisation Please provide a short presentation of your organisation (key activities, affiliations, size of the organisation, etc.) relating to the area covered by the project (limit 2000 characters). The Harokopio University of Athens was founded on 1991. Its design and evolution since then has been conducted based on international standards, as well as on scientific studies dictated by the Ministry of Education. Today, the Harokopio University of Athens has more than 1000 students, dispersed in its 4 departments, namely the department of Home Economics and Ecology, the department of Dietetics and Nutritional Science, the department of Geography, as well as the department of Informatics and Telematics. Moreover, 4 postgraduate programmes operate in the University, for offering high quality knowledge to its graduates. Additionally, the University has obtained significantly high ratings with regards to citations per professor / researcher and is thus greatly acknowledged within the international academic community. In particular, according to a special study conducted by the National Documentation Centre, the Harokopio University of Athens is one of the four Greek Universities that have been continuously publishing work that is highly acknowledged and dispose impact levels that lie beyond or at the world average. Department of Informatics and Telematics Current necessities dictated by the Information Society and the Knowledge Society envisage professionals who will be able to effectively manage new technologies based on the Internet and the World Wide Web, aiming at the development of complex information systems and the support of advanced services. In this context, the department of Informatics and Telematics (www.dit.hua.gr) was founded in 2006 and accepts Undergraduate students since the academic year 20072008. On 2011, the department has launched its postgraduate programme in Informatics and Telematics , with three MScs in “Computational and Internet Technologies and Applications”, “Advanced Telecommunication Systems and Applications”, “Advanced Information Systems in Management”. The mission of the department is to promote the Informatics science, primarily in the areas of network-centric systems and e-services, so as to provide students with the theoretical and practical skills and competences, which are necessary for the design, development and delivery of technical solutions, in the fields of Information and Communication Technologies. The scientific directions of the department include the following: • modern e-services and applications, such as e-health, e-learning, e-commerce, e-government, intelligent transportation systems; • wireless networks and mobile communications, optics, autonomic computing and cognitive networking; • parallel and distributed systems, grid computing environments and cloud computing; • system modeling and simulation, as well as human-machine interaction; • knowledge management and semantics in data management – data mining from databases and the world wide web; Information processes; flow systems, web services and applications in business Social media and web 2.0 applications (information harvesting and data aggregation) The graduates of the department are trained with scientific completeness in the department knowledge areas and thus dispose a direct interconnection with all areas of informatics applications. In this respect, they will be qualified to handle the Joint Master in Information Security and Data Management / (ISDM) Page 5 of 54 increased requirements of modern society. Around 100 students are admitted every year. The duration of the undergraduate course is eight semesters (four years) and leads to a degree. The curriculum is composed of both theoretical and applied courses. Last, the department continually upgrades its infrastructure equipment (hardware, mobile devices, sensors etc.) and information resources (books and access to scientific journals) to advance teaching and research efforts of its members. Please describe also the role of your organisation in the project (limit 1000 characters). HUA will lead the workpackage (WP2) and involve on other acticivites as management and quality workpackages. D.1.2 - Operational capacity: Skills and expertise of key staff involved in the project Please add lines as necessary. Summary of relevant skills and experience, including where relevant a list of Name of staff member recent publications related to the domain of the project. Prof. Peri Loucopoulos Partner number ☒ Organisation name & MIDDLESEX UNIVERSITY HIGHER EDUCATION CORPORATION acronym MU D.1.1 - Aims and activities of the organisation Please provide a short presentation of your organisation (key activities, affiliations, size of the organisation, etc.) relating to the area covered by the project (limit 2000 characters). Joint Master in Information Security and Data Management / (ISDM) Page 6 of 54 P3 Middlesex University is a large International University with 35, 000 students many of who study overseas, with campuses in London, Dubai Mauritius and soon in Malta. Middlesex University consists of six Schools and the Institute of Work -Based Learning. Since 1996 MDX has received 3 Queen’s Anniversary Prizes and a Queen’s Award for Enterprise, the only UK university to achieve this recognition. MDX has an excellent record of QAA accreditations, and has also extensive experience in developing and delivering undergraduate, Master’s and PhD programmes in a range of fields. We have an extensive network of international links and have been collaborating in joint research projects funded mainly by EU iniatives and programmes. The University pioneered e-learning and e-training support through the use of innovative technologies and elearning strategies. Experts from across the University ensure that all programmes adhere to the EQF, ENQA standards and the QAA (UK). Please describe also the role of your organisation in the project (limit 1000 characters). The Department of Computer Science has extensive experience in quality assurance projects funded under Tempus and also in knowledge transfer activities. The proposed team has secured in the past research funds from JISC towards developing tools and practices for aligning curriculum documentation and mapping course information by using an information model that is now a national standard. The eXchanging Course Related Information – Content Advertising Profile (XCRI-CAP) model was used to provide a service for comparing course details and various fields used for curriculum design and development. Middlesex University can provide the infrastructure and experience required for mapping and alignment between the different grading systems and curriculum structures that exist in the project’s partner institutions. D.1.2 - Operational capacity: Skills and expertise of key staff involved in the project Please add lines as necessary. Summary of relevant skills and experience, including where relevant a list of Name of staff member recent publications related to the domain of the project. Georgios A. Dafoulas Dr George Dafoulas is a Principal Lecturer in Business Information Systems at School of Sciences & Technology. He is the Programme Leader for various programmes and has served as the Curriculum Leader in Pedagogy for Global Campus and a member of the University’s e-Learning Strategy Group. He has extensive experience in managing research projects including AUNP and Minerva projects, while he is currently involved with two Tempus projects. Over the past four years he has managed eight projects funded by the JISC research council in the UK. His published work includes journal and conference papers in the fields of e-learning and social media and has several PhD students and current research activities in social learning networks. Saleeb, N. & Dafoulas, G. (2011) Affordances and Constraints to ELearning: Role of Architecture in 3D Learning Space Digital Design in International Journal for Digital Society, vol. 2, no. 3, pp. 36-47. Serce, F.C., Swigger, K., Alpaslan, F.N., Brazile, R., Dafoulas, G. And Lopez, V. (2011) Exploring the Communication Behavior among Global Software Development Learners, Special Issue of Global Software Development in the International Journal of Joint Master in Information Security and Data Management / (ISDM) Page 7 of 54 Computer Applications in Technology (IJCAT) (To Appear) Serce, F.C., Swigger, K., Alpaslan, F.N., Brazile, R., Dafoulas, G. And Lopez, V. (2011) Online collaboration: Collaborative behavior patterns and factors affecting globally distributed team performance Computers in Human Behavior, Volume 27, Issue 1, January 2011, Pages 490-503. Saleeb, N. & Dafoulas, G. (2010) Turning Immigrants to Citizens: Merits of the pedagogical shift in 3D Virtual Learning Environments in International Journal for Infonomics (IJI), vol. 3, no. 4, pp. 369381. Saleeb, N. & Dafoulas, G. (2010) Effects of Virtual World Environments in Student Satisfaction: An Investigation of the Role of Architecture in 3D Education in International Journal of Knowledge Society Research (IJKSR), vol. 2, no. 1, pp. 28-48. Balbir Barn Professor Balbir S. Barn, BSc, PhD, Deputy Dean, is Professor of Software Engineering at Middlesex University, UK. Balbir has over 15 years commercial research experience working in research labs at Texas Instruments and Sterling Software where he was involved in the research and design of leading software products such as the IEF™. His research is focused on model driven software engineering where the goal is to use models as abstractions and execution environments to support, for example, enterprise architecture and application integration using complex events. He has led numerous externally funded projects which apply model driven principles to business processes, user interface design, learning theories and more recently the theory building aspects to model driven engineering. Currently Balbir's research interests include Enterprise Architecture simulation languages and incorporation of value sensitive issues in Enterprise Architecture. Current externally funded projects include the multi-disciplinary project – MAYOT: Mobile Applications for Youth Offending Teams (http://www.mayot.mdx.ac.uk). This project includes experts from the fields of criminology and social policy. Balbir S. Barn, Ravinder Barn, Jo-Pei Tan: Young People and Smart Phones: An Empirical Study on Information Security. HICSS 2014: 4504-4514 Tony Clark, Balbir Barn: Goal Driven Architecture Development using LEAP. Enterprise Modelling and Information Systems Architectures 8(1): 40-61 (2013) Balbir S. Barn, Tony Clark: Revisiting Naur's Programming as Theory Building for Enterprise Architecture Modelling. CAiSE 2011: 229-2 Tony Clark, Balbir S. Barn: A common basis for modelling service- Joint Master in Information Security and Data Management / (ISDM) Page 8 of 54 oriented and event-driven architecture. ISEC 2012: 23-3 Balbir S. Barn, Tony Clark: A Domain Specific Language for Contextual Design. HCSE 2010: 46-61. P4 Partner number ☒ European centre of Studies and Initiatives CESIE D.1.1 - Aims and activities of the organisation Please provide a short presentation of your organisation (key activities, affiliations, size of the organisation, etc.) relating to the area covered by the project (limit 2000 characters). Organisation name & acronym CESIE (www.cesie.org) is a European Centre of Studies and Initiatives, non-profit, apolitical, secular nongovernmental organisation established in 2001 and accredited by the Region of Sicily for Orientation of Vocational Education and Training, with macro-typology of Higher Education and lifelong learning (LLL) for "development, introduction and implementation of reforms in education, training to increase integration and develop employability". Our MISSION is to promote growth through innovative and participative educational approaches. CESIE is active in several MEDA countries to reduce youth unemployment in the Mediterranean area through the promotion of mobility and vocational education of young people, building their capacities in the sectors of needs analysis and project management at Mediterranean level. Approaches and methods: CESIE develops integrated projects on the basis of social demands and with the participation of stakeholders and the various forms of social representations, meant to serve as a space for interaction of theory and practice, research and action, studies and initiatives – applying the holistic approach CESIE’s activities are based on. Structural organization: CESIE’s five departments work in synergy on activities related to: European Cooperation, International Cooperation, Higher Education and Research, Mobility and Socio-cultural Promotion. The head office is located in Palermo with other offices in India, Nepal and Senegal. CESIE’s 35 staff members are international and multicultural, characterized by a wide range of profiles, skills and qualifications. We also relies on 50+ external experts, including sociologists, psychologists, researchers, professors, trainers, social workers, health professionals, and others. Equally important is the contribution of up to 150 interns/volunteers per year from all over the world. Affiliations and Networks: CESIE links local, national and international contexts and is committed to stimulate development and change in cultural, educational and economic spheres through the creation and use of innovative tools and methods. Please describe also the role of your organisation in the project (limit 1000 characters). Joint Master in Information Security and Data Management / (ISDM) Page 9 of 54 To ensure a smooth flow of the project and continuous enhancement an accurate quality control and monitoring plan and respective tools will be developed. The idea is two-fold: to constantly get feedback of the participants on the quality of the project organization as well as conducting regular review of the documentations to ensure accurate, financial and technical tracking of the project activities, when requested by the grant-holder. The lead partner for the WP is CESIE and it will take care of timely and efficient implementation of the QCM activities. The major tangible outputs for the WP will be the QCM plan and tools, reports on WP implementation and achievements. Next, the grant-holder with the EU partners will conduct monitoring by visiting the PCI and observing on spot the project developments and achievements. The reports on WPs and the analysis of the visits will feed into the intermediate and final reports to be submitted to EACEA. Close to the end of the project an external audit will be invited to review the documentations, protocols and other documents related to the project implementation for factual findings and report to EACEA. The WP will be divided in two parts: 1) Internal monitoring: will be lead by CESIE as part of its role as project coordinator. The internal monitoring will aim to supervise the work of partners and give support, while ensuring that all milestones are reached through a quality process. All partners will be actively involved in the internal monitoring, contributing to the achievement of the results and outputs of this WP. Communication will be an essential part of internal monitoring because it will ensure the transfer of information regarding the project and the performance of partners, as well as prevent and/or resolve possible challenges. In case of problems by one partner or among partners in the project performance or in the development of the planned activities, CESIE will activate a plan consisting mainly in: giving permanent support for the realisation of the activities, analysing with the partner(s) the origin of the problem and proposing solutions to it monitoring the implementation of the possible solutions and their results involving all the Consortium to ensure other point of views and good practices to overcome the problems foreseeing alternative solutions, informing and asking for support to the EC in case of need. 2) External monitoring: The grantholder will subcontract an external evaluator who will contribute to the quality of work and the Consortium. The external evaluator will be in charge of monitoring all the activities at local and international levels; creating and delivering tools for the assessment of the quality of work and the impact of activities (training and coordination events); developing annual reports based on the results of the evaluation activities; giving recommendations to the partnership on how to improve the project performance (if needed); assist CESIE in the management of potential challenges of partners (if needed); participating in XX Consortium meetings, giving advice for the quality of the work programme. D.1.2 - Operational capacity: Skills and expertise of key staff involved in the project Please add lines as necessary. Summary of relevant skills and experience, including where relevant a list of Name of staff member recent publications related to the domain of the project. Project Manager at ‘Higher Education and Research’ department and ‘Visibility and communication office’ responsible at CESIE. European project Luisa Ardizzone experience gathered relating to Youth, Adult education, VET, school education, higher education, Transversal Action on dissemination and exploitation, (YiA; LLP Grundtvig, Comenius, Leonardo, KA4, Erasmus; Joint Master in Information Security and Data Management / (ISDM) Page 10 of 54 TEMPUS), Justice DPIP, Daphne III and ERDF (URBACT II, Thematic Networks), establishing permanent links between the public and the private sector by cooperating with HEI and local/regional authorities at local and international level. Experienced in educational project management, Higher Education capacity building, field Research, Quality Assurance and transversal process/progress monitoring, dissemination strategies and implementation Rita Quisillo Letizia Portera Degree in Politics and International Relations, Master in EU Project Management. She is an experienced trainer in non-formal education and in the management of EU-funded projects aiming at capacity building and intercultural dialogue . In CESIE she is coordinating projects related to the field of entrepreneurship and mobility, under the Erasmus for Young Entrepreneurs Programme and mobility projects such as Leonardo da Vinci and EVS. And she is coordinating the project Capacity Building relay Race – CaBuReRa under the ENPI CBC MED Programme (www.caburera.org) She has collaborated with CESIE since 2011. She works in the project development office and she’s leading the work at CESIE for Daphne III project, EuropeAid CSD EU-Turkey project Her experience includes management of Europe for Citizens & YiA as a coordinator and trainer and has been recently assigned to be project manager at CESIE for the H2020 project on market efficiency. She’s also working in the International cooperation Department developing project’s proposal under EuropeAid, ENPI and IPA. Joint Master in Information Security and Data Management / (ISDM) Page 11 of 54 P5 Partner number ☒ Organisation name & acronym ARAB AMERICAN UNIVERSITY-Jenin AAUJ D.1.1 - Aims and activities of the organisation Please provide a short presentation of your organisation (key activities, affiliations, size of the organisation, etc.) relating to the area covered by the project (limit 2000 characters). The Arab American University-Jenin (AAUJ) located in the Governorate of Jenin was established in September 2000 as the first private university in Palestine. Since the 1970s, many Palestinian universities have been established in the West Bank. However, in addition to being subject to the limitations of the conditions of occupation, these institutions have had to rely mainly on insufficient levels of public funding and on charitable support from abroad. The founders of AAUJ were moved to create a new paradigm: By mobilizing local private capital, this new private university would not only avert many of the constraints of public funding, but it would also set a new standard for Palestinian higher education. AAUJ was conceived to accomplish the following strategic goals: 1. To provide excellence in education 2. To carry out engaged and applied research 3. To play a central role in the integrative and comprehensive development of the Jenin and Tubas governorates in particular and in Palestinian development at large 4. To achieve financial sustainability and growth AAUJ’s role as an engine and catalyst for human and economic development in the region and beyond indicates its importance as an effective private-sector initiative and model not only for a new direction in Palestinian higher education but also for integrative and comprehensive development. Institutional Growth In 2000 AAUJ began with an initial enrolment of 270 students, a couple dozen academic and administrative staff, one faculty (Art and Sciences) and a single building. By the end of 2013, AAUJ has grown to include: 1. More than 500 academic and administrative employees 8,200 students (among them 2,570 Arab students from inside Israel) 2. Seven faculties Arts and Sciences Dentistry Engineering and Information Technology Law Allied Medical Sciences Administrative and Financial Sciences (the largest in Palestine) Graduate Studies AAUJ is currently building the largest sport village in Palestine. Please describe also the role of your organisation in the project (limit 1000 characters). AAUJ will participate in developing the program design and the developing the courses. They will also arrange and host a workshop for evaluating the first year of the running program in the third year of the project. D.1.2 - Operational capacity: Skills and expertise of key staff involved in the project Joint Master in Information Security and Data Management / (ISDM) Page 12 of 54 Please add lines as necessary. Summary of relevant skills and experience, including where relevant a list of Name of staff member recent publications related to the domain of the project. Dr. Muath Sabha is the dean of the Faculty of Engineering and Information Technology (EIT) at the AAUJ. Mr. Sabha is an assistant professor in Computer Engineering, Computer Graphics, and he is the founder and the chairman of the Multimedia Technology Department for six years in the Muath Sabha Faculty of Information Technology at the Arab American University of Jenin. He is a Multimedia Technology Specialist and consultant in the Ministry of Education and Higher Education for the Palestinian E-Learning Project. Mr. Muath established an IT company in the field of Computer Graphics and Multimedia Production named “Neiraba Animation Studios”. Received the M.Sc. and Ph.D. degrees in computer science from the Ecole des Mines (Excellence Engineering school) and Claude Bernard Lyon1 University in 2002 and 2007 respectively (French government excellence scholarship). Actually he is associate professor at AAUJ University and the coordinator for the graduate program in computer science. He was researcher and lecturer in the University of Le Havre and University of Claude Bernard Lyon1, Lyon, France. Laboratory LMAH, Le Havre, Project GRR, and LIRIS laboratory at research group SILEX team: Supporting Interaction and Learning by Amjad Ratrout Experience between 2006-2013, and ex member in: Knowledge and Complex Systems (CoSyCo). He is member in Complex Systems and Multi Agents paradigm team, and member in the « Association Francophone de Recherche d'Information et Applications » (ARIA). His research addresses the study, programming and modeling of complex, dynamic and distributed systems in the Web using Multi Agent Systems paradigm with respect to the Complex Adaptive Systems perspectives,WI Cloud computing, E learning, traffic simulation and IS. Adwan Yasin is an Associate professor at computer Science Department(AAUJ), Former Dean of Faculty of Engineering and Information Technology of the Arab American University of Jenin, Palestine. Previously he worked at Philadelphia and Zarka Private University, Jordan. He received his PhD degree from the National Technical University of Ukraine in 1996. He is teaching graduated an under graduated courses. He has many Contributions Adwan Yassin in Departmental, Faculty, University committees, IT workshops, and Scientific Conferences. He has many training certificates (MCSE,CCNA, C# Dot NET Technology,..) and he is a member of technical committees of many international journals. His research interests include Computer Networks, Computer Architecture, Cryptography and Networks Security in which he has many publications in international Conferences and journals. Partner number ☒ Organisation name & Hebron university acronym HU D.1.1 - Aims and activities of the organisation Please provide a short presentation of your organisation (key activities, affiliations, size of the organisation, etc.) relating to the area covered by the project (limit 2000 characters). Joint Master in Information Security and Data Management / (ISDM) Page 13 of 54 P6 Hebron University was established in 1971 as pioneering higher education in Palestine. The university started as a small college of Shari' a (Islamic Law) serving a total of 43 students. Currently, Hebron University offers 39 programs leading to Bachelor degrees and 6 programs leading to Master degree. Hebron University awards B.A or B.Sc degrees in each of its 10 faculties: Faculty of Agriculture, Faculty of Al-Shari'a, Faculty of Arts, Faculty of Education, Faculty of Finance and Management, Faculty of Science and Technology, Faculty of Nursing, Faculty of law, Faculty of pharmacy and College of Graduate Studies & Scientific Research offers nine Master degrees in the Arabic Language & Literature, English Linguistics, Business Administration, Islamic Judiciary Law, chemistry, Mathematics , Plant Protection, Sustainable Natural Resources and Management and History. Hebron University is an independent Palestinian institution of higher education, serving over 8,500 students, around 70% of whom are female. Computer Science (CS) department has founded in 1998, and it is the fourth department at the Faculty of Science and Technology. CS department provides three programs for students to obtain bachelor's degrees. The first program specializes in computer science whereas students who enroll in this program need to successfully pass 127 credit hours. The second program specializes in Multimedia and Web Technology. Additionally, CS department provide a bachelor's degree in Computer Networks Security and Safety. Indeed opening a Master program in Information Security and IT Management (MISIM) will help our students to join this program and give them too many opportunities for future jobs in Palestine and abroad. Please describe also the role of your organisation in the project (limit 1000 characters). As a partner of this project, HU will form the basis of the continued international responsibilities to achieve the objectives of this project. The management activities include: Planning of project activities, contact between coordinator and consortium members, conducting workshops, communication over the Internet to initiate, organize and follow-up project task. D.1.2 - Operational capacity: Skills and expertise of key staff involved in the project Please add lines as necessary. Summary of relevant skills and experience, including where relevant a list of Name of staff member recent publications related to the domain of the project. Dr. Hasasneh received his PhD in computer Engineering from the University of Hull, UK, (2006), and his M.Sc. in Computer Engineering from Jordan University of Science and Technology, Jordan, (2000), and B.Sc. in computer Engineering from Palestine Polytechnic University, Palestine,(1997). Dr. Hasasneh occupied many positions in Hebron University, where he was the Head of the Computer Department and a member of many committees such Dr. Nabil Hassasneh as: Member of academic council, Member of Faculty of Science and Technology council…etc. from 2000-present. Also, Dr. Hasasneh was responsible for many computerized activities such as: The University Computer Network, The University website development, the University Software Systems development and also supervised E-learning Unit from 2009. Joint Master in Information Security and Data Management / (ISDM) Page 14 of 54 Currently, Dr. Hasasneh is working at Hebron University as the Dean of the Faculty of Science and Technology and his current research activities are focused around highly-parallel Chip Multiprocessors based DRISC Technology or Microthreading. His work is published in a wide range of computer architecture journals and international conferences. Several of his papers have received a wards for contributions that have demonstrated long-term impact. Dr. Hasasneh research interests include Computer Architecture, Compiler Optimization, Multithreading, Chip Multiprocessors, E-learning and Asynchronous Design. Ph.D in Computer Engineering from the Dipartimento di Informatica e Sistemistica "A . Ruberti" (Department of Computer & Systems Engineering “A. Ruberti”) at SAPIENZA Universita' di Roma (SAPIENZA University of Rome). Italy http://www.dis.uniroma1.it/~dottoratoii/students/khalil-massri PhD research activities can be summarized according to the following branches: Design, analysis and evaluation of efficient algorithms for routing protocols applied in Dr. Khalil Massri mobile ad-hoc networks. Mainly, protocols used in Delay Tolerant Networks (DTN) and Mobile Computing Devices (MCD) networks. Exploiting network coding algorithms in data delivery protocols used for adhoc and mobile cloud networks. In particular, erasure-coding for data dissemination in mobile clouds. Real implementation and experimentation for data delivery protocols using wireless resource constrained devices, such as Mobile devices and active RFIDs. Moreb have professional experience in Information Technology and web development and e learning system consultant and I work in Al- Quds University, Birzeit University, An- Najah National and Hebron university and I Mohammad Adnan Moreb have excellent relations and network for both staff and student among all university and I work as Microsoft trainer, my experience due 10 years on age 32 reflect my innovation and creatively idea for my jobs. in my CV I summarize most of my experience during last 8 years some of related experience for e learning consultant as following: Joint Master in Information Security and Data Management / (ISDM) Page 15 of 54 • Developing more than 30 web site for al-Quds University (2004- 2009), Hebron University (2009 – now) and consultant for many other organizations, development web site using php, asp.net, CMS Drupal, joomla. • Establish the e learning unite in Hebron university and give the training for more than 80 academic teacher in all facility to using the eLearning system and work with them to design and develop fully e learning course. • 2 year experience as e learning consultant and trainer for LIT Project (Al- Quds University, Birzeit University and An- Najah National), Microsoft trainer for MCAD, MCSD Joint Master in Information Security and Data Management / (ISDM) Page 16 of 54 List of Associated Partners (Where applicable) These organisations may provide the consortium with facilities or assistance that enhances the quality of work, but they cannot be responsible for core activities of the project (e.g. management, coordination, monitoring, leader of a work group etc.). No financial contribution from the project grant will be allocated to these organisations. ☒ Ref.nr Name of organisation Type of institution City Country Role in the project Please insert rows as necessary D.2. Cooperation arrangements, management and communication This part must only be completed once by the applicant. D.2.1 - Project management Please define the organisation of the implementation of the project and the division of tasks between the partners. Please explain the allocation of resources for each activity. Explain also how the tasks are distributed amongst the partners and how project "ownership" is ensured (limit 3000 characters). The project work packages and the relevant activities are distributed amongest partners based on their experiences. The project consists of nine work packages. The project overall management will be assigned to PTUK. (Preparartion) WP1 Exploration of EU teaching and research practises, preparing the roadmap for the project and development of joint working protocols . WP Leader (MU) Activities: - A1.1 Plan and Assess the needs for the information management - A1.2 Plan and assess the needs of security Joint Master in Information Security and Data Management / (ISDM) Page 17 of 54 - A1.3 Kick-off Meeting Preparation - A1.4 Organize study tour to the EU partners universities (Development) WP2 Program and Curriiculum Design WP Leader (HUA/AAUJ) - A2.1 Workshops for the program design and outline - A2.2 Organise a study tour to HUA university - A2.3 Developing Data Management Courses and tutorials - A2.4 Developing Courses in Information Security - A2.5 Developing courses for information privacy and ethics - A 2.6 Organising a study tour to EU UNiversity. - A2.7 Developing courses in computer forensics. - A2.8 Developing elective courses. (Preparation) WP3 Preparation and Accreditation WP Leader (PTUK/AAUJ) - A3.1 Preparing the required documents for the accrediation process - A3.2 Preparing for the Computer Security Labs - A3.3 Organize a study tour to the EU universities - A3.4 Bids and installation of the required equipments and softwares (Quality) WP 4 Quality Control WP Leader (CESIE) - A4.1 Prepare quality plan for both Internal and external monitoring - A4.2 Quality of Management and Governance- proposed assessment criteria and indicators (Exploitation and Dissemination) WP5 Project Dissimination and Exploitation WP Leader (HUA) - A5.1 Develop Web Portal with web 2.0 functionalities - A5.2 Publish Leaflets - A5.3 Organise National workshops and raise awarness of the Program - A5.4 Teaching - A5.5 Sudents and supervisors mobility (Management) WP6 Project Management WP Leader (PTUK) - A6.1 Attending "Erasmus plus projects representatives meetings" - A6.2 Formation of the steeing Group - A6.3 Organising the Kick-off meeting - A6.4 Financial and administrative management - A6.5 Production of intermediate and final reports. D.2.2 - Cooperation and communication arrangements of the consortium Please explain the overall project and partnership management making specific reference to the management plan and how decisions will be taken. Please describe how permanent and effective communication and reporting will be ensured as well as the measures put in place for conflict resolution (limit 2000 characters). Joint Master in Information Security and Data Management / (ISDM) Page 18 of 54 PTUK will take the lead in most of the aministrative work and the communications. Joint Master in Information Security and Data Management / (ISDM) Page 19 of 54 PART E - Project characteristics and relevance E.1. Why does the consortium wish to undertake this project? Please outline the motivation behind your project, clearly identifying the specific needs or problem/s which it intends to solve. Explain how the project proposal fits within the development strategies of the Partner Countries involved and how it addresses the priorities defined at national / regional level. Also explain why this/these problem/s were selected instead of others. In particular, explain how the area of intervention has been explored to guarantee that the project is offering something new compared to the existing situation. Where applicable, explain any synergy with other EU initiatives should be highlighted (limit 5000 characters). Governmental institutions but also the universities in Palestine suffer the scarcity of the basic knowledge on information management, strategy, quality, privacy and security. These issues are important for public, private and non-profit organizations. By getting the information management right, this will result in reducing administrative labor cost- less actual time moving information around and outside the enterprise. This saves massive amounts of staff time and labor cost. It also reduces wasted time and mistakes – access to constantly updated information from an easy to locate source - prevents repetition of work on out of date documents. Getting the proposed project will improve the skills of the teaching staff in information protection and management. These skills will be disseminated to other institutions in Palestine and Jordan through the membership of other Palestinian and Jordanian Universities in the consortium. The project will also empower academic staff and graduate students by providing the required facilities for MSc projects. This project will facilitate better collaboration, which means Palestinian and Jordanian staff will work closely with their European counterparts and build up expertise in the areas of security and information management. Information management also helps with compliance of regulations, which will lead to reduce the cost of audits. Information security and privacy including data protection, copyrights and intellectual properties are of high priority in the Palestinian and Jordanian societies private and public sectors. Ethics, Copyright and Intellectual Property Issues in Computing and Privacy and Information Security Concerns represent a crucial necessity for the Palestinian universities, industry and community as a whole. The public and the private sectors in Palestine are not fully aware of the importance of having a national framework of ethics and professional conduct to enhance the quality of service and protect the overall society from computer, internet and social media crimes. The universities in Palestine are not embedding these issues in their pedagogical curricula and do not pay fully attention of these concerns. The industry also shows lack of understanding and application of the intellectual property and privacy and information security concerns. IT strategy and management is also essential in strategic planning for institutions and enterprises. Please describe briefly how your project proposal was prepared (e.g., capitalising on previous experiences, based on achieved outcomes in former projects, following previous cooperation amongst the consortium members, etc.) (limit 1000 characters). The idea of the project comes from PTUK as a state flourishing university in Palestine. Dr. Eleyan took the initiative to contact different partners from EU and Palestine. These EU partners are renowned HEIs in Europe and has the reuired expertise to support and lead the project. If your proposal is based on the results of one or more previous projects / networks, please provide precise references to this / these project(s) / network(s) in the table below. Reference number ☒ Joint Master in Information Security and Data Management / (ISDM) Page 20 of 54 Project dates (year started and completed) Programme or initiative Title of the project Coordinating organisation http:// Website Password / login if necessary for website Please summarise the project outcomes and describe (a) how the new proposal seeks to build on them and, (b) how ownership / copyright issues are to be dealt with (limit 1000 characters). Please copy and paste tables as necessary. E.2. Rationale for the setting-up of the consortium Please explain why the selected partners are best suited to participate in this European project. Describe innovative and or complementary skills, expertise and competences within the consortium directly relating to the planned project activities. If associated partners are involved, please explain their role in the project and the added value to the consortium (limit 3000 characters). The partnership will be led by Harokopio University (HUA) in Greece has extensive experience in successfully managing EU funded projects, development of graduate studies degrees and research supervision. The academic staff at HUA will share their expertise in developing graduate programmes in Information and IT management areas. They will have a significant role in developing and delivering relevant modules and training programmes for staff, evaluating the overall programme and sharing research. Dr. George Dafolos from Middlesex university UK will also provide advice on program and courses design. According to the Quality Assurance Plan (to be drafted by CESIE (month 4), monitoring and evaluation will be conducted internally and externally on a six-monthly base. Evaluations will be both formative (conducted during the project in order to improve the results) and summative (conducted at the end of the project to assess achievements). All planning and reporting tools will be provided to partners. Online evaluation questionnaires (after meetings / during -after WP ending) will be prepared and sent out; responses will be analyzed and reported. E.3. European added value Please describe the benefits of and need for European cooperation. Please describe also why the results cannot be achieved through national, regional or local funding (limit 1000 characters). This proposal aims to develop a new master program to bridge the gap of knowledge and build competencies of the Palestinian society with the know-how for information management, quality, privacy and security in various aspects of life. It will provide resources and training for academic staff including facilities to develop the program modules. The project will transfer the know-how and best practices from Europe to Palestine, through proposing a joint MSc in Information Security and Data Management (ISDM). This project will focus on developing the academic modules and tutorials to establish a joint MSc degree in the partners’ universities. In other words, the project aims to develop teaching staff capacity building and graduate students in four main areas (information management, Information security, IT Laws and Rules, and Computer forensics), which are the main challenges in implementing any service either in private or public sector. Joint Master in Information Security and Data Management / (ISDM) Page 21 of 54 E.4. Innovative character Indicate what the project is offering that is new and what are the main innovating elements (limit 2000 characters). The project will provide a new MSc degree in Information Security and IT management. Getting the proposed project will improve the skills of the teaching staff in information protection and management. These skills will be disseminated to other institutions in Palestine through the membership of other Palestinian Universities in the consortium. The project will also empower academic staff and graduate students by providing the required facilities for MSc projects. This project will facilitate better collaboration, which means Palestinian staff will work closely with their European counterparts and build up expertise in the areas of security and information management. Information management also helps with compliance of regulations, which will lead to reduce the cost of audits. Information security and privacy including data protection, copyrights and intellectual properties are of high priority in the Palestinian and Jordanian societies private and public sectors. Ethics, Copyright and Intellectual Property Issues in Computing and Privacy and Information Security Concerns represent a crucial necessity for the Palestinian universities, industry and community as a whole. The public and the private sectors in Palestine are not fully aware of the importance of having a national framework of ethics and professional conduct to enhance the quality of service and protect the overall society from computer, internet and social media crimes. The universities in Palestine are not embedding these issues in their pedagogical curricula and do not pay fully attention of these concerns. The industry also shows lack of understanding and application of the intellectual property and privacy and information security concerns. IT strategy and management is also essential in strategic planning for institutions and enterprises. Joint Master in Information Security and Data Management / (ISDM) Page 22 of 54 PART F - Quality of the project design and implementation F.1. Aims and objectives Please define the concrete aims and objectives of the project and describe the ways in which the situation set out under the previous section (Part E) will be changed (limit 3000 characters). a.The development of the proposed MSc program's curriculum in cooperation with the partner universities. b.Capacity building of Palestinian and Jordanian academic staff by training a number of the teaching staff to become the teaching core of the newly established MSc program. c.Equipping laboratories to be utilized by graduates during their studies d.Establish links with Palestinian, Jordanian and European local industry to provide ideas of relevant MSc projects and placements for graduates e.MSc modules to be taught jointly by staff members from Local and European institutions during the implementation stage f.Staff members from the consortium will embark on joint research in areas of common interest. This includes the supervision of MSc students’ projects. g.Improving the management skills of Data Centers in Palestinian and Jordanian institutions. F.2. Project activities and Methodology Please define the activities proposed and the working methodology (project activities/developments including educational and training content and pedagogical approach) to be used for achieving the objectives, including major milestones, measurable indicators, etc. (limit 6000 characters). The main aim of this project is to develop a master degree at Palestine Technical UNiversity and Arab American University and provide necessary supporting laboratory and library resources. The academic contents of the programme will be developed during the first two years of the project. To ensure the high standard and quality of the programme, it will be submitted to the Palestinian Ministry of Higher Education for accreditation. The research and laboratory infrastructure at ptuk in the Department of electrical and computer Engineering is not up to what is expected for a university to run graduate studies and be able to provide sufficient support to graduate level projects. PTUK requires support to build up their laboratory and research facilities and resources to support the successful development and delivery of high standard programme. The project will provide capacity building of Palestinian academics by training them on the use of research facilities and by enabling a number of MSc holder staff to become PhD holders following split-site doctorate programmes at EU partner institutions. The lack of graduate studies in Information security at Palestinian institutions is attributed to the requirements necessary to launch a successful programme. PTUK University believes that it is their duty to serve the Palestinian population and to fill in the gap in higher education infrastructure by establishing a master program in the proposed Information Security and IT management. The project will develop the required master level programme and help in providing training and resources for researchers in a methodological approach that takes into account the local needs and national priorities, and to fit them within a global network of education and knowledge. In addition to developing the MSc programme, the project will encourage research ethos culture among Palestinian academics by providing necessary equipment and training and building research skills. . The project will involve academics, students and stakeholders at different levels and implementation stages. Academics from EU institution will share their graduate level teaching and research experience with Palestinian academics by contributing to programme and module specifications and detailed contents as well as delivering and reviewing a number of the designed modules. Palestinian academics will enrich and enhance their teaching and research knowledge by visiting EU institutions and participating in the implementation stages of the project and by contributing to programme and module specifications and detailed contents as well as delivering and reviewing number of the designed modules. Joint Master in Information Security and Data Management / (ISDM) Page 23 of 54 During the first six months of the project, all partners will participate in round table discussion with relevant Palestinian industries, organizations and government bodies to establish the level of cooperation and assessment of need for MSc level graduates and support required for execution of graduate level projects and seminars. The project will also investigate ways in which academia could benefit the Palestinian engineering industry and other relevant organisation to ensure a two way flow of knowledge for a sustainable national collaboration. Also, a workshop will be held at during the second year of the project. Academics, industry and government representatives of related research, teaching and training areas will be invited in an effort to promote university-industry cooperation. The workshop will be open to all stakeholders including students and professionals who may benefit from the development of the programme and support facilities. The specific project objectives are the following: - The development of high quality Master programmes in information security in cooperation with the partner institutions. - - Building laboratory facilities to be utilized by graduate students during their courses and thesis - Academic staff from Local and EU institutions will deliver the first year of the MSc - Collaboration between the partners’ institutes to prepare joint research bids in areas in common interest. Such cooperation will help sustain the joint activities beyond the life time of the project. - Additionally, one of the project’s wider objectives is to establish collaboration in the Palestinian context by engaging in discussion with Palestinian companies, professional and governmental organizations. The cooperation between the partnership will last for three years and the project will be carried out in three stages: The Preparation Stage: careful planning will take place for the project kick-off meeting to ensure a smooth start of the project. The kick-off meeting will be held at PTUK and will serve to establish the needed atmosphere for the project success. The meeting will educate project partners about the logistics and reporting requirements. This meeting will involve developing detailed planning the first six months activities and an overall planning for activities throughout the project. The kick off meeting will be followed by visits of the Palestinian partners to EU partners’ institutions to explore graduate teaching facilities and research and training centres and discuss staff training requirement and programme development areas and courses. To assess collaboration between different entities in the Palestinian context that are necessary for the success and sustainability of the project’s outcomes, all partners will participate in round table discussion in a meeting to be held at Birzeit with relevant Palestinian industries, organizations and government bodies. This will establish the level of cooperation and assessment of need for MSc level graduates and support required for execution of graduate level projects and seminars. Ways for academics to benefit the industry and relevant organisations will F.3. Budget and cost effectiveness Please describe the strategy adopted to ensure that the proposed results and objectives will be achieved in the most economical way and on time. Explain the principals of budget allocation amongst partners. Indicate the arrangements adopted for financial management and what co-financing modalities are planned (limit 3000 characters). n preparing this proposal we endeavored to achieve the objectives of the project in the most cost effective way. We minimized travel by (i) arranging activities so that visitors perform multiple tasks on a visit (monitoring, dissemination, promoting the Bologna process and financial management); (ii) using video-conferencing and e-learning technologies when possible, particularly for teaching some of the course; (iii) reducing staff cost to the minimum necessary and asking partners to provide some staff input as their co-financing share; and (iv) limiting the purchase of equipment to items which are absolutely necessary for the achievement of this project's objectives. We believe the project delivers good value for money. As for the budget allocation, a number of important principles were followed. First, Erasmus Plus rules Joint Master in Information Security and Data Management / (ISDM) Page 24 of 54 were strictly followed. Second, budget has been allocated to different partners based on the demands of different tasks, activities and deliverables that they are involved in. For partner country universities, their needs have been the guiding factor in allocation of equipment, printing and publishing budget and other costs. For all partners, the budget for staff was guided by activities they are involved in and the time they need to put. Third, to meet the responsibilities of the project’s administration and financial management, PTUK was allocated an extra share of the budget Financial management is the most crucial element of the project management. PTUK is skilled with project coordination with experienced staff who worked on several Tempus projects before. They are very familiar with Tempus rules and regulations. Additionally, all financial work is subject to the financial and auditing rules of the PA. Any further training needed will be provided to ensure full understanding and adherence to Tempus rule. A system will be in place to ensure that financial records are maintained consistently in all institutions F.4. Quality control and Monitoring Please explain what mechanisms have been put in place for ensuring the quality of the project and how the evaluation will be carried out. Please define the specific quality measures established, as well as the benchmarks and indicators foreseen to verify the outcome of the action. Make sure that the information in this section is consistent with the project Logical Framework Matrix (limit 3000 characters). The qulaity and control will be divided in two parts: 1) Internal monitoring: will be lead by CESIE as part of its role as project coordinator. The internal monitoring will aim to supervise the work of partners and give support, while ensuring that all milestones are reached through a quality process. All partners will be actively involved in the internal monitoring, contributing to the achievement of the results and outputs of this WP. Communication will be an essential part of internal monitoring because it will ensure the transfer of information regarding the project and the performance of partners, as well as prevent and/or resolve possible challenges. In case of problems by one partner or among partners in the project performance or in the development of the planned activities, CESIE will activate a plan consisting mainly in: •giving permanent support for the realisation of the activities, analysing with the partner(s) the origin of the problem and proposing solutions to it •monitoring the implementation of the possible solutions and their results •involving all the Consortium to ensure other point of views and good practices to overcome the problems •foreseeing alternative solutions, informing and asking for support to the EC in case of need. 2) External monitoring: The grantholder will subcontract an external evaluator who will contribute to the quality of work and the Consortium. The external evaluator will be in charge of •monitoring all the activities at local and international levels; •creating and delivering tools for the assessment of the quality of work and the impact of activities (training and coordination events); •developing annual reports based on the results of the evaluation activities; Joint Master in Information Security and Data Management / (ISDM) Page 25 of 54 PART G - Impact, dissemination and exploitation, sustainability G.1. Expected impact of the project Please explain who will use these project outputs / products / results and how the consortium will reach them. Describe how the target groups (including participating institutions, stakeholders) will be reached and involved during the life of the project and how the project will benefit the target group at local, regional, national and or European level. Please structure your description according to the different levels of impact and stakeholders (limit 3000 characters). The main outcome of this project is the development of a model of a joint MSc in Information Security curriculum that well suites universities in the region and has the unique elements of e-learning, industrial tutorials, distributed team work and joint thesis supervision. Successful exploitation of this curriculum in the partner universities is a core and integral part of the project is allocated considerable resources. Partner country universities all lack a similar a degree and are in bad need of one. They will implement the curriculum by obtaining the required approvals and running the first round of the programme. This will pave the way for other universities to model this programme or join the consortium for joint deployment and implementation. Central to our curriculum philosophy, design and implementation is sustainability. Sustainability activities are designed to ensure that partner country institutions are committed, and have the ability, to continue the implementation of the outcomes of the Project after funding comes to an end. Particularly, the Project will produce the following outcomes which will ensure the sustainability of results: a. The new Master in information security programme with its newly prepared teaching model and materials will be included in the regular programmes of the participating universities and offered yearly; b. The developed programme should be continually kept evolvable to meet advances and evolution in the subject area. At the heart of our design, and to handle such co-evolution, will be the introduction of “” modules. The contents of such modules will change regularly taking into account current development in the subject area and local needs. c. Carefully defined evolvable industrial case studies will be an integral part of the modules developed in this program. d. Some, if not all, of the modules within the developed programme will be appropriately packaged and be offered as industrial training, hence serving local industrial needs. e. The staff needed to teach the programme in partner universities will be trained, retrained and updated; f. Equipment, books and software will be in place for the continuation of the new programmes g. Improved understanding of the Bologna process (through the establishment of the two programmes, seminars on the promotion of the Bologna process and the visit of senior members of universities to EU countries) in partner countries will facilitate its eventual adaptation. Finally, dissemination of the outcomes to all relevant stakeholders will contribute to the sustainability of the project results and the ultimate success of ISIM Project. This will be achieved by reaching all possible targets groups and informing them of the project and encouraging them to participate in its activities. Stakeholders of this project are the students and staff of partner country universities; companies in the field, employers of these students; administrative staff of the universities and Ministries of Education. Workshops will be organized and dissemination materials (CDs, brochures, website) to disseminate all the relevant information to other faculties and departments of each university as well as to stakeholders outside the universities. Joint Master in Information Security and Data Management / (ISDM) Page 26 of 54 Please describe how the target groups (including participating institutions, stakeholders) will be reached after the project is finished (limit 3000 characters). The master programme will be run at the two partners universitues as a joint MSc programme and continue recruiting new studnts from different universities in Palestine. Overview of short and long term impact indicators Please add rows as necessary according to indicators ☒ Target Short term impact groups/potential Quantitative indicators beneficiaries Long term impact Target groups/potential beneficiaries Quantitative indicators Qualitative indicators Qualitative indicators G.2. Dissemination and exploitation strategy Please explain how the dissemination will be organised and how exploitation activities will ensure optimal use of the results within the project's lifetime and after. Explain the roles, responsibilities and target groups (limit 3000 characters). The project will be promoted according to a dissemination strategy that will be carried out mostly by the academic and administrative staff of the project at PTUK University in cooperation with other partners in two ways: • Disseminate the project results to all members inside the consortium • Disseminate the project results outside the consortium in Palestine and the region The dissemination of knowledge and results within the consortium will be achieved through progress reports, meetings and minutes . The project website will be a major dissemination tool. A part of this project website will be allocated for internal use by the project members and project monitoring bodies if required with communications including file exchange and discussion forums. Furthermore, the project reports will mainly be for internal circulation within the consortium and monitoring bodies in order to keep all members up to date about the progress of the project. As for dissemination outside the project consortium, a website for the project will be established and launched to the public at the beginning of the first year the project which will report on the project's intermediate outcomes and events. Links to other relevant websites will also be established which may include in addition to partners websites, other Palestinian universities. Palestinian Ministry of Higher Education, other ministries and governmental organizations and engineering organizations. Other dissemination materials such as brochures, posters, and leaflets will be designed and printed in both Arabic and English. These materials will be distributed to all potentially interested parties in the project, the developed programme and research facilities including universities, ministries, engineering Joint Master in Information Security and Data Management / (ISDM) Page 27 of 54 industry and organizations. G.3. Sustainability Explain how the impact of this project will be sustained beyond its lifetime. Please list the outcomes that you consider sustainable and describe the strategy to ensure their long lasting use beyond the project's life financially, institutionally and policy level. Also explain how the results will be mainstreamed and multiplied in the sector of activity and in the participating institutions. Describe the strategy foreseen to attract cofunding and other forms of support for the project (limit 2000 characters). The project exploitation activities are planned to ensure sustainability of the proposed programme and associated research facilities beyond the lifetime of the project. These activities are: - Accreditation of the programme by the Palestinian Ministry of Higher Education to ensures the institutional sustainability of the programme. - Lecturers at PTUK University who were trained during the project will be capable of carrying out the teaching and supervision of graduate project. They will continue to use the teaching and course materials designed and reviewed during the project - Equipment and simulation packages for the programme laboratory and projects will be purchased using the project funds. In addition, a list of books will be purchased to establish a core specialized library for the programme - The success of the programme in its first year of implementation will be an important factor in preluding for a continuous cooperation in the future with the European partners. The academic staff at Birzeit University will discuss the possibility and requirements of bilateral cooperation with EU partner institutions where EU academics may be appointed as visiting Professors at Bizeit to continue teaching on the programme for the seeable future. -- Other activities will serve as an opening for future cooperation of the consortium members in conducting joint research projects, publications and exchange of visits. - The project is expected to strengthen the links between Palestinian universities, engineering industry and organizations and the Government. Joint Master in Information Security and Data Management / (ISDM) Page 28 of 54 LOGICAL FRAMEWORK MATRIX – LFM Wider Objective: ☒ Indicators of progress: What is the overall broader objective, to which the project will contribute? What are the key indicators related to the wider objective? What are the sources of information on these indicators? Specific Project Objective/s: Indicators of progress: How indicators will be measured: What are the specific objectives, which the project shall achieve? What are the quantitative and qualitative indicators showing whether and to what extent the project’s specific objectives are achieved? What are the sources of information that exist and can What are the factors and conditions not under the be collected? What are the methods required to get direct control of the project, which are necessary to this information? achieve these objectives? What risks have to be Brochures of Joint Master Degree in considered? The project main aim is the capacity building of the faculty members through developing and implementing a Joint MSc degree in Information Security and Data Management with the Partners Universities, consistent with EU. The project will foster the transfer of state-of-the-art knowledge and best practices from Europe to Palestine a. The development of the proposed MSc program's curriculum in cooperation with the partner universities. b. Capacity building of Palestinian and Jordanian academic staff by training a number of the teaching staff to become the teaching core of the newly established MSc program. c. Equipping laboratories to be utilized by graduates during their studies d. Establish links with Palestinian, Jordanian and European local industry to provide ideas of relevant MSc How indicators will be measured: Development, validation and implementation of the MSc Program Periodical reviews from consultations with: students, recently graduated students, and management of enterprises on the territory covered by beneficiary institutions. Participation of industry to project’s events (validation, workshops, conferences, offers of student placements) nterest of the economic market and information security and IT management. • Best practice guide for preparing and teaching e-Learning courses has been written. • Starting the joint Masters Degree in information security and IT management after being approved by Palestinian Ministry of Higher Education. • Co-supervision of students’ theses with EU universities • Organization of seminars on the Bologna System • Expert involvement in the development of the M.Sc. curriculum By evaluation of discussion, questionnaires and interviews that will be periodically presented. The quality of graduated students assessed by employers (but only after a project implementation). Number of external organizations (Industry, Academic and Public Sector) participating to project’s events. information security and IT management. Establishment of project web site in PTUK with customized access to teaching/project material for internal and external organizations. The new MSc in information security and IT management is announced and included in the regular study Programs of universities. Reports of staff completing updating visits in EU universities Number of participants in the Joint Master in Information Security and Data Management / (ISDM) Page 29 of 54 Assumptions & risks: Cooperation among partner universities for joint development and teaching of the MSc program. Approval of the new Joint Master Degree in information aecurity by University and Accreditation Agencies in partner countries. Continuation of the support of the University authorities for the Project in partner countries. Participation of students projects and placements for graduates (also against the level of compliance with the Bologna Framework) e. MSc modules to be taught jointly by staff members from Local • Industry participation to the and European institutions during the courses’ definition and implementation stage implementation f. Staff members from the consortium will embark on joint research in areas of common interest. This includes the supervision of MSc students’ projects. g. Improving the management skills of Data Centers in Palestinian and Jordanian institutions. Outputs (tangible) and Outcomes Indicators of progress: What are the indicators to measure whether and to (intangible): Please provide the list of concrete DELIVERABLES outputs/outcomes (grouped in Workpackages), leading to the specific objective/s.: (Preparartion) WP1 Exploration of EU teaching and research practises, preparing the roadmap for the project and development of joint working protocols . WP Leader (MU) Activities: - A1.1 Plan and Assess the needs for the information management - A1.2 Plan and assess the needs of security - A1.3 Kick-off Meeting Preparation - A1.4 Organize study tour to the EU partners universities (Development) what extent the project achieves the envisaged results and effects? • Models of joint M.Sc. Programs implementing the Bologna framework and its future developments have been identified • Principles and Guidelines to establish a joint M.Sc. program have been developed • industry advisory board are formulated • Senior staff from partner country universities visiting EU universities • Preparation of the new Mater structures and modules • Production of the Best Practice Guide to develop and deliver eLearning courses. • Staff undertaking updating Bologna system workshops Number of students enrolled on MSc in information security Program in its first run. Number of students visiting EU universities for joint thesis supervision. Reports of students completing study periods in EU universities Workshops/conferences at the end of every year How indicators will be measured: Assumptions & risks: What are the sources of information on these indicators? What external factors and conditions must be realised to obtain the expected outcomes and results on schedule? • Reports of staff on updating visits • Students accomplished their Master dissertation. • Brochures of new Joint Degree in Information security and IT management and Study Guides produced by universities. • Reports of EU staff on teaching and training activities • Libraries of universities are supplied with the books, journals and teaching materials • Equipment has been bought and installed at the partner country universities to establish the teaching laboratories. • Web sites, leaflets and Joint Master in Information Security and Data Management / (ISDM) Page 30 of 54 • Continued interest of partner country teaching staff in updating visits to EU universities • Availability of EU staff to undertake teaching in the partner countries • EU universities remaining interested in hosting students form partner universities to undertake study periods in their side. • Speedy appointment of local coordinators and local administrators and arrangements for banking in partner countries • Continued willingness of partner country universities to learn about the Bologna system • Risks due relating to possible WP2 Program and Curriiculum Design WP Leader (HUA) - A2.1 Workshops for the program design and outline - A2.2 Organise a study tour to HUA university - A2.3 Developing Data Management Courses and tutorials - A2.4 Developing Courses in Information Security - A2.5 Developing courses for information privacy and ethics - A 2.6 Organising a study tour to EU UNiversity. - A2.7 Developing courses in computer forensics. - A2.8 Developing elective courses. (Preparation) WP3 Preparation and Accreditation WP Leader (PTUK) - A3.1 Preparing the required documents for the accrediation process - A3.2 Preparing for the Computer Security Labs - A3.3 Organize a study tour to the EU universities - A3.4 Bids and installation of the required equipments and softwares visits • Teaching visits by EU professors • Evaluation and validation of Program by PC • Students from partner country unversities undertaking study periods in the EU • Spending on equipment & books • Setting up project web site • Distribution of Project Newsletter • Dissemination of Project activities • Inclusion of the Joint Degree in Software Enginnering in regular university Programs • Establishment of planning and monitoring meetings • Quality of project’s output and outcomes is periodically evaluated and achieved • Reports by External Evaluator • Formation of Steering Group • Appointment of local coordinators and local administrators newsletter produced for dissemination upheaval/war in the territory • Intermediate and Final reports of the Project • Workshop and conference proceedings (on-line and printed) (Quality) WP 4 Quality Control WP Leader (CESIE) - A4.1 Prepare quality plan for both Joint Master in Information Security and Data Management / (ISDM) Page 31 of 54 Internal and external monitoring - A4.2 Quality of Management and Governance- proposed assessment criteria and indicators (Exploitation and Dissimination WP5 Project Dissimination and Exploitation WP Leader (HUA) - A5.1 Develop Web Portal with web 2.0 functionalities - A5.2 Publish Leaflets - A5.3 Organise National workshops and raise awarness of the Program (Management) WP6 Project Management WP Leader (PTUK) - A6.1 Attending "Erasmus plus projects representatives meetings" A6.2 Formation of the steeing Group - A6.3 Organising the Kick-off meeting - A6.4 Financial and administrative management - A6.5 Production of intermediate and final reports. Joint Master in Information Security and Data Management / (ISDM) Page 32 of 54 Activities: Inputs: What are the key activities to be carried out (grouped in Workpackages) and in what sequence in order to produce the expected results? What inputs are required to implement these activities, e.g. staff time, equipment, mobilities, publications etc.? Preparartion) WP1 Exploration of EU teaching and research practises, preparing the roadmap for the project and development of joint working protocols . WP Leader (MU) Activities: - A1.1 Plan and Assess the needs for the information management - A1.2 Plan and assess the needs of security - A1.3 Kick-off Meeting Preparation - A1.4 Organize study tour to the EU partners universities (Development) WP2 Program and Curriiculum Design WP Leader (HUA) - A2.1 Workshops for the program design and outline - A2.2 Organise a study tour to HUA university - A2.3 Developing Data Management Courses and tutorials - A2.4 Developing Courses in Information Security - A2.5 Developing courses for information privacy and ethics - A 2.6 Organising a study tour to EU The total number of working days dedicated to the project is 384 days in category 1 and 1450 days in category 2 and 200 in category 3 and 510 in category 4 plus in manpower dedicated to the project by partner universities under co-financing rule. • The following equipment will be purchased to establish a software engineering lab in each partner country: 1. Interactive white board (smart board) for teaching room; 2. 30 PCs for Computer laboratory for students; 3. Software tools and packages 4. Laptop computer for use with LCD projector; 5. LCD projector for teaching room; 6. Heavy duty printers for Computer Laboratory; 7. Server in each partner country to support the e-Learning platform; 8. Contribution towards cost of video conference equipment. • A total of 392 days of mobility will be achieved to accomplish the project objectives (from EU to partner countries and the other way) • The following items will be published and distributed: Joint Master in Information Security and Data Management / (ISDM) Page 33 of 54 Assumptions, risks and preconditions: What pre-conditions are required before the project starts? What conditions outside the project’s direct control have to be present for the implementation of the planned activities? • Continuation of relative political stability and social peace in each partner country • Continuation of friendly relationships between the six partner countries universities and universities in the EU • Universities in each country remaining willing to cooperate with each other and working together • Any change in the management of universities and faculties will not adversely affect their support for the Project UNiversity. - A2.7 Developing courses in computer forensics. - A2.8 Developing elective courses. (Preparation) WP3 Preparation and Accreditation WP Leader (PTUK) - A3.1 Preparing the required documents for the accrediation process - A3.2 Preparing for the Computer Security Labs - A3.3 Organize a study tour to the EU universities - A3.4 Bids and installation of the required equipments and softwares (Quality) WP 4 Quality Control WP Leader (CESIE) - A4.1 Prepare quality plan for both Internal and external monitoring - A4.2 Quality of Management and Governance- proposed assessment criteria and indicators (Exploitation and Dissimination WP5 Project Dissimination and Exploitation WP Leader (HUA) - A5.1 Develop Web Portal with web 2.0 functionalities 1. Training materials about Bologna system. 2. Teaching materials for the MSc program 3. Website setting 4. Publicity brochures and CD. 5. Other necessary reports, surveys, etc. • External experts will subcontracted for project external evaluation and QA. • Textbooks on information security and IT mangement of value 25,000 Euro will be obtained for libraries in the partner country universities. Joint Master in Information Security and Data Management / (ISDM) Page 34 of 54 - A5.2 Publish Leaflets - A5.3 Organise National workshops and raise awarness of the Program (Management) WP6 Project Management WP Leader (PTUK) - A6.1 Attending "Erasmus plus projects representatives meetings" A6.2 Formation of the steeing Group - A6.3 Organising the Kick-off meeting - A6.4 Financial and administrative management - A6.5 Production of intermediate and final reports. Joint Master in Information Security and Data Management / (ISDM) Page 35 of 54 WORKPLAN Please use the model provided. Applicants are expected to complete a one-page work plan for each project year. For each year of your project proposal, please complete a work plan indicating the deadlines for each outcome and the period and location in which your activities will take place. Please create additional work plan tables if further space is needed. The same reference and sub-reference numbers as used in the logical framework matrix must be assigned to each outcome and related activities. Activity carried out in the Programme Country: Activity carried out in the Partner Country (ies): = (E.g. activity in France for two weeks in the first month of the project 2= under M1) X (E.g., activity in Tunisia for three weeks in the second month of the project: 3X under M2) WORKPLAN for project year 1 ☒ Activities Ref.nr/ Sub-ref nr 1.1 1.2 1.3 1.4 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 2.9 Title Plan and Assess the needs for the information management Plan and assess the needs of security Kick-off Meeting Preparation Organize study tour to the EU partners universities Workshops for the program design and outline Organise a study tour to HUA university Developing Data Management Courses and tutorials Developing Courses in Information Security Prepare quality plan for both Internal and external monitoring Quality of Management and Governance- proposed assessment criteria and indicators Attending "Erasmus plus projects representatives meetings" Formation of the steering Group Financial and administrative management Total duration (number of weeks) M1 8 8X 8 4 2 4 2 12 12 M2 M3 M4 M5 M6 M9 M10 M11 M12 8X 2 4X 2 12X 12x 3 3 1 4 M8 4X 3 1 M7 3 1 1X 1X 1X Joint Master in Information Security and Data Management / (ISDM) Page 36 of 54 1X 2X WORKPLAN for project year 2 ☒ Activities Ref.nr/ Sub-ref nr 2.10 2.11 2.12 2.13 3.1 3.2 3.3 3.4 5.1 5.2 5.3 6.1 6.2 Title Developing courses for information privacy and ethics Organising a study tour to EU University Developing courses in computer forensics Developing elective courses Preparing the required documents for the accreditation process Preparing for the Computer Security Labs Organize a study tour to the EU universities Bids and installation of the required equipment and software Develop Web Portal with web 2.0 functionalities Publish Leaflets Organise National workshops and raise awareness of the Program Attending "Erasmus plus projects representatives meetings" Financial and administrative management Total duration (number of weeks) M1 12 12X 2 12 12 M2 M3 M4 M5 M6 M7 M8 M9 M10 M12 2 12X 12X 8 8X 4 2 4X 2 4 4X 16 4 16X 4X 6 1 M11 6X 1 4 1X 1X Joint Master in Information Security and Data Management / (ISDM) Page 37 of 54 1X 1X WORKPLAN for project year 3 ☐ Activities Ref.nr/ Sub-ref nr 5.1 6.1 6.2 6.3 Total duration (number of weeks) Title Start the classes teaching Attending "Erasmus plus projects representatives meetings" Financial and administrative management Production of intermediate and final reports M1 32 1 M2 M3 M4 M5 M6 M7 M8 M9 M10 M11 M12 1X 2X 2 4X 1X 2 32X 1 4 10 1X 1X Joint Master in Information Security and Data Management / (ISDM) Page 38 of 54 PART H - Work packages Please enter the different project activities you intend to carry out in your project. Make sure that the information in this section is consistent with the project Logical Framework Matrix. H.1. Description of work packages, outcomes and activities Work package type and ref.nr ☒ PREPARATION 1 Exploration of EU teaching and research practices and development of joint working protocols Title Related assumptions and risks Plan and assess the needs for information management The Palestinian and Jordanian needs for information management will be specified with an active involvement of the partners from public and private sectors. These needs will be prepared in in month 3. (Deliverable 1.1) Description Estimated Start Date (01-10-2015) - A1.1 Plan and Assess the needs for the information management - A1.2 Plan and assess the needs of security - A1.3 Kick-off Meeting Preparation - A1.4 Organize study tour to the EU partners universities Estimated End Date (30-03-2016) Lead Organisation MU Participating Organisation PTUK, MU, CESIE, HUA, AAUJ, and HU Tasks Deliverables/results/outcomes Expected Deliverable/Results/ Outcomes Work Package and Outcome ref.nr Title Type 1.1. ☐ Teaching material ☐ Learning material ☐ Training material Description Due date 30-03-2016 Languages English ☒ Event ☒ Report ☐ Service/Product Target groups ☐ Teaching staff ☐ Students ☐ Trainees ☒ Administrative staff ☐ Technical staff ☐ Librarians ☐ Other If you selected 'Other', please identify these target groups. (Max. 250 characters) Dissemination level ☒ Department / Faculty ☒ Institution ☒ Local ☒ Regional ☒ National ☒ International Joint Master in Information Security and Data Management / (ISDM) Page 39 of 54 Please copy and paste tables as necessary. Work package type and ref.nr ☒ Title DEVELOPMENT 2 Program and Curriculum Design Related assumptions and risks Estimated Start Date (1-5-2016) The output of this working package is a complete document to be submitted to the Ministry of Higher Education for an MSc program. -A2.1Workshops for the program design and outline - A2.2 Organise a study tour to HUA university - A2.3 Developing Data Management Courses and tutorials - A2.4 Developing Courses in Information Security - A2.5 Developing courses for information privacy and ethics - A 2.6 Organising a study tour to EU University. - A2.7 Developing courses in computer forensics. - A2.8 Developing elective courses. Estimated End Date (30-4-2017) Lead Organisation HUA/AAUJ Participating Organisation PTUK, MU, CESIE, HUA, AAUJ, and HU Description Tasks Deliverables/results/outcomes Expected Deliverable/Results/ Outcomes Work Package and Outcome ref.nr Title Type Description Due date 2.1. ☒ Teaching material ☒ Learning material ☐ Training material ☒Event ☒ Report ☐ Service/Product 30-4-2017 Languages Target groups ☒ Teaching staff ☐ Students ☐ Trainees ☒ Administrative staff ☐ Technical staff ☒ Librarians ☐ Other If you selected 'Other', please identify these target groups. (Max. 250 characters) Dissemination level ☒ Department / Faculty ☒ Institution ☒ Local ☒ Regional ☒ National ☐ International Please copy and paste tables as necessary. Joint Master in Information Security and Data Management / (ISDM) Page 40 of 54 Work package type and ref.nr ☐ Title Preparation 3 Preparation and Accreditation Related assumptions and risks Description Estimated Start Date (1-4-2017) - A3.1 Preparing the required documents for the accreditation process - A3.2 Preparing for the Computer Security Labs - A3.3 Organize a study tour to the EU universities - A3.4 Bids and installation of the required equipment and software Estimated End Date (1-10-207) Lead Organisation PTUK Participating Organisation PTUK, MU, CESIE, HUA, AAUJ, and HU Tasks Deliverables/results/outcomes Expected Deliverable/Results/ Outcomes Work Package and Outcome ref.nr Title Type Description Due date 3.1. ☐ Teaching material ☐ Learning material ☐ Training material ☐ Event ☐ Report ☒ Service/Product 1-10-2017 Languages Target groups ☐ Teaching staff ☐ Students ☐ Trainees ☒ Administrative staff ☒ Technical staff ☐ Librarians ☐ Other If you selected 'Other', please identify these target groups. (Max. 250 characters) Dissemination level ☒ Department / Faculty ☒ Institution ☒ Local ☐ Regional ☐ National ☐ International Please copy and paste tables as necessary. Work package type and ref.nr ☒ Title Quality 4 Quality Control Related assumptions and risks Description This work package will be initiated with the project start and ends after the closing ceremony. Joint Master in Information Security and Data Management / (ISDM) Page 41 of 54 Estimated Start Date (1-5-2017) - A4.1 Prepare quality plan for both Internal and external monitoring - A4.2 Quality of Management and Governance- proposed assessment criteria and indicators Estimated End Date (30-9-2018) Lead Organisation CESIE Participating Organisation PTUK, MU, CESIE, HUA, AAUJ, and HU Tasks Deliverables/results/outcomes Work Package and Outcome ref.nr Title Expected Deliverable/Results/ Outcomes 4.1. ☐ Teaching material ☐ Event ☐ Learning material ☐ Report ☐ Training material ☒ Service/Product Every deliverable will follow the quality standards put in this working package. 30-9-2018 Type Description Due date Languages Target groups ☒ Teaching staff ☒ Students ☒ Trainees ☒ Administrative staff ☒ Technical staff ☒ Librarians ☐ Other If you selected 'Other', please identify these target groups. (Max. 250 characters) Dissemination level ☒ Department / Faculty ☒ Institution ☐ Local ☐ Regional ☐ National ☐ International Please copy and paste tables as necessary. Work package type and ref.nr ☒ Title Exploitation and Dissemination 5 Project Dissemination and Exploitation Related assumptions and risks Description Tasks Estimated Start Date (1-10-2015) - A5.1 Develop Web Portal with web 2.0 functionalities - A5.2 Publish Leaflets - A5.3 Organise National workshops and raise awareness of the Program - A5.4 Teaching - A5.5 Students and advisors mobility Estimated End Date (30-9-2018) Joint Master in Information Security and Data Management / (ISDM) Page 42 of 54 Lead Organisation HUA Participating Organisation PTUK, MU, CESIE, HUA, AAUJ, and HU Deliverables/results/outcomes Expected Deliverable/Results/ Outcomes ☒ Work Package and Outcome ref.nr Title Type Description Due date 5.1. ☐ Teaching material ☐ Learning material ☐ Training material ☒ Event ☐ Report ☒ Service/Product 30-9-2018 Languages Target groups Dissemination level ☒ Teaching staff ☒ Students ☐ Trainees ☒ Administrative staff ☒ Technical staff ☐ Librarians ☐ Other If you selected 'Other', please identify these target groups. (Max. 250 characters) ☒ Department / Faculty ☒ Local ☒ National ☒ Institution ☐ Regional ☐ International Please copy and paste tables as necessary. Work package type and ref.nr ☒ Title Management Project Management Related assumptions and risks Description Estimated Start Date (1-10-2015) - A6.1 Attending "Erasmus plus projects representatives meetings" - A6.2 Formation of the steering Group - A6.3 Organising the Kick-off meeting - A6.4 Financial and administrative management - A6.5 Production of intermediate and final reports. Estimated End Date (30-9-2018) Lead Organisation PTUK Participating Organisation PTUK, MU, CESIE, HUA, AAUJ, and HU Tasks Deliverables/results/outcomes Joint Master in Information Security and Data Management / (ISDM) Page 43 of 54 6 Expected Deliverable/Results/ Outcomes ☒ Work Package and Outcome ref.nr Title Type Description Due date 6.1. ☐ Teaching material ☐ Learning material ☐ Training material ☒ Event ☒ Report ☒ Service/Product 30-9-2018 Languages Target groups Dissemination level ☐ Teaching staff ☐ Students ☐ Trainees ☒ Administrative staff ☐ Technical staff ☐ Librarians ☐ Other If you selected 'Other', please identify these target groups. (Max. 250 characters) ☐ Department / Faculty ☐ Local ☐ National ☒ Institution ☐ Regional ☒ International Joint Master in Information Security and Data Management / (ISDM) Page 44 of 54 H.2. Explanation of work package expenditures Please explain what costs will be associated to each work package and covered by lump sums, flat rates, unit costs, and real costs. Provide information on the travels necessary to complete the workpackage. Detailed information on each travel must be indicated in the Budget Excel table. If purchase of equipment is required, explain how the respective equipment addresses the needs identified in the project. Remember that the specification of each item, including the partner country university/ies at which equipment will be installed, must be detailed in the Budget Excel table. If any subcontracting is considered necessary for the implementation of the project, please explain why the task cannot be performed by the consortium members themselves (limit 3000 characters). If your project involves a Special Mobility Strand, please explain what support will be required under each budget heading in order to cover organisational costs (such as special needs, exceptional, nononline linguistic support, etc.) (limit 2000 characters). In the special mobility strand, students and their supervisors will visit UK to be involved in research in addition to measure security and data management practices. This needs them to visit real data centers which have real security cases. Joint Master in Information Security and Data Management / (ISDM) Page 45 of 54 H.3 Consortium partners involved and resources required to complete the work package Indicative input of consortium staff - The total number of days per staff category should correspond with the information provided in the budget tables. Work Package Ref.nr Partner nr Partner acronym Number of staff days1 ☒ Country Role and tasks in the work package Category 1 PREPARATION P1 P2 P3 P4 P5 P6 PTUK HCU MU CESIE AAUJ HU Palestine Greece UK Italy Palestine 60 8 6 8 25 Category 2 Category 3 35 10 10 10 35 Palestine 10 0 0 0 10 5 Category 4 Total 40 5 5 40 5 5 SUBTOTAL DEVELOPMENT SUBTOTAL QUALITY PLAN SUBTOTAL DISSEMINATION & EXPLOITATION SUBTOTAL MANAGEMENT 1 Please see Programme Guide, Part B for your action, Table A – Project Implementation (amounts in Euro per day) Programme Countries and Table B - Project Implementation (amounts in Euro per day) Partner Countries. Joint Master in Information Security and Data Management / (ISDM) Page 46 of 54 SUBTOTAL TOTAL Please insert rows as necessary Joint Master in Information Security and Data Management / (ISDM) Page 47 of 54 Subcontracting of tasks to external bodies should be very occasional. The specific competences and particular expertise needed to reach the project objectives should be found in the consortium and should determine its composition. Subcontracting is intended for specific, time-bound, project-related tasks which cannot be performed by the Consortium members themselves. Tasks that will be subcontracted: Work Package Ref.nr Partner responsible for subcontracting (Acronym) Country Number of days (where appropriate) Brief description of task ☒ Please insert rows as necessary. Joint Master in Information Security and Data Management / (ISDM) Page 48 of 54 PART I – Special Mobility Strand Applies ONLY to cooperation projects with partner countries from REGIONS 1, 2 and 3 Projects may organise mobility activities of students, researchers and staff so far as they support/complement the other activities of the Capacity Building project and bring added value in the realisation of the project's objectives. Mobility activities do not constitute the main activities for Capacity Building. I.1. Relevance of mobility activities Please describe what kind of mobility activities are foreseen in the Special Mobility Strand, what are their objectives and expected results. Explain how the mobility activities of students, researchers and staff support/complement the other activities of the Capacity Building and bring added value in the realisation of the project's objectives (limit 3000 characters). I.2. Identification and selection of the participants Please describe the procedures set up for identification and selection of participants for the mobility activity (limit 1000 characters). I.3. Preparation and support Please describe the structure for preparation of the participants for the mobility activity, including specific training or course, linguistic preparation etc. Please explain the support provided in terms of accommodation, insurances, etc. Please explain the quality measures set up in the sending and receiving organisations for monitoring the mobility activity and measures to be taken if the results foreseen are not met (limit 2000 characters). I.4. Involvement of people with fewer opportunities Does your project involve people with fewer opportunities? ☐ YES ☒ NO IF YES, how many participants coming from which countries and organisations would fall under this category? Specify the type of situation of fewer opportunities these participants are facing (limit 2000 characters). Please explain the nature of the support required and how it will be addressed, so that these persons can fully engage in the foreseen activities (limit 1000 characters). Joint Master in Information Security and Data Management / (ISDM) Page 49 of 54 I.5. Recognition and validation of learning outcomes Please explain how the project intends to recognise and validate the teaching and/or learning outcomes of the participants (limit 1000 characters). N/A Joint Master in Information Security and Data Management / (ISDM) Page 50 of 54 PART J - OTHER EU GRANTS Please list the projects for which the organisations involved in this application have received financial support from EU programmes. Programme or initiative DG EAC Tempus IV VI Call [SMGR] 543711-TEMPUS-12013-1-AMTEMPUS-SMGR DG EAC Tempus IV VI Call [JPCR] 543651-TEMPUS-12013-1-AT-TEMPUSJPCR Technische Universität Wien DG EAC Tempus IV VI Call [SMGR] 544125-TEMPUS-12013-1-AMTEMPUS-SMGR Yerevan State University, YSU DG EAC Tempus IV VI Call [SMGR] 544302-TEMPUS-12013-1-DE-TEMPUSSMGR University of KoblenzLandau [UKOLD] DG EAC Tempus IV V Call [SMHES] DG EAC Tempus IV V Call [JPCR] 530321-TEMPUS-12012-1-AMTEMPUS-SMHES 530311-TEMPUS-12012-1-AMTEMPUS-JPCR Armenian State University of Economics Armenian State Pedagogical University DG EAC Tempus IV VI Call [JPCR] 543651-TEMPUS-12013-1-AT-TEMPUSJPCR Technische Universität Wien LLP - Grundtvig - MLP LLP – Grundtvig MLP LLP – Grundtvig MLP Reference number 527488-LLP-1-20121-UK-GRUNDTVIGGMP 527744-LLP-1-20121-IT539784-LLP-1-20131-FR-GRUNDTVIG- Beneficiary Organisation Yerevan State Academy of Fine Arts, YSAFA Doncaster College CESIE Elan Interculturel Title of the Project ☒ GOVERN Development of State-of-the-art Management System for Efficient Structural Changes in Line with Bologna Principles SEHSI Regional sustainable development on the basis of eco-human synergetic interaction (multidisciplinary training course for MSc, PhD and LLL students in engineering) PICASA Promoting Internationalization of HEIs in Eastern Neighbourhood Countries through Cultural and Structural Adaptations ENCHASE Enhancing Albanian System Of Quality Assurance in Higher Education: Application of the Process- and Outcome-Based Methodology ARARAT - Armenian Coordination Agency “UNIVERSITY – EMPLOYER” MAHATMA - Master in Higher Education management: developing leaders for managing educational transformation SEHSI Regional sustainable development on the basis of eco-human synergetic interaction (multidisciplinary training course for MSc, PhD and LLL students in engineering) LION - Learning, lIving, wOrking for Neet-group ALCE - Appetite for Learning Comes with Eating INSART - L'insertion des jeunes par l'Art Joint Master in Information Security and Data Management / (ISDM) Page 51 of 54 LLP – Grundtvig MLP LLP – Grundtvig MLP GMP 540477-LLP-1-20131-IE-GRUNDTVIGGMP 540222-LLP-1-20131-SE-GRUNDTVIGGMP South-East Regional Authority - SERA FIERE - Furthering Innovative and Entrepreneurial Regions Anders Ljungstedts gymnasium Mobility In Learning in Europe LLP- KA2 531117-LLP-1-20121-SI-KA2-KA2MP Spinaker PROLANG - Promotion of Learning Less Used European Languages to Youth on the Move LLP- Leonardo- TOI 2012-1-AT1-LEO0506967 Volkshochschule Tirol TANDEM NOW LLP- Leonardo- TOI 2012-1-PL1-LEO0527465 LLP-TOI 2013-1-GB2-LRO0510638 LLP- Leonardo- TOI 2012-1-FR1-LEO0534954 AGH – University of Science and Tecnology University of Gloucestershire (e)VET2EDU Supporting Vocational Teachers and Trainers in e-learning VIPER ADICE Transfer of Administrative and Pedagogical Tools useful to manage mobility project CESIE Learning By Doing Business Club Austrialia DEEP.Com goes Mobile (DCGM) L1-359 CESIE EYE VISION C5-325474 SARETAS EYE ENGAGED LLP- Erasmus MLP 539439-LLP-1-20131-ES-ERASMUS-ESIN INOVA+ DG Home Affairs CIPS / ISEC HOME/2012/ISEC/A G/THB CISS DG Home Affairs PPUAM HOME/2012/PPUA M/4113 Direzione Centrale della Polizia Criminale DG Justice DAPHNE III - MLP DG Justice DAPHNE III – MLP Open Society Foundation (OSF) JUST/2012/DAP/AG/ 3273 JUST/2012/DAP/AG/ 3049 LLP – Leonardo PLM LLP- Grundtvig – Accompanying measures Erasmus for young entrepreneurs Erasmus for young entrepreneurs LdV PLM2012-1-IT1LEO02-02559 527617-LLP-2012AT-GRUNDTVIGGAM IN2SAI - Increasing Young Women's Participation in Science Studies and in the Aeronautic Industry ROOT - Research On Organized Trafficking Systems VIGILA ET PROTEGE – To search and protect unaccompanied minors through the S.I.S. II – ‘fight against invisibility’ Università di Coventry Replace2 Exchange House SUNIA GEEL 2 OR2014-13275 CESIE Platform for voice Erasmus+ KA2 Strategic Partnership KA200-2014-006 KKU-Copenhagen Youth School SMART - Second Chance Schools Working with Systematic Measurement of Outcomes Erasmus+ KA2 Strategic Partnership 2014-1-DE02KA204-001549 WBK Weiterbildungskolleg Monchengladbach (Germany) DISCO - Digital Second Chance Opportunities Joint Master in Information Security and Data Management / (ISDM) Page 52 of 54 Erasmus+ KA2 Strategic Partnership 2014-1FR01-KA204008762 Erasmus+ KA2 Strategic Partnership Erasmus+ KA2 Strategic Partnership 2014-1-LT01-KA204000617-949677628 2014-1-PL01-KA204003037 ADICE PC IMPRESS - Promotion and Capitalization of International Mobility Project to Reinforce Employability and Sociability System Social Innovation Fund (Lithuania) JOB-YES! Choose a job not a dole ZDZ Katowice Europa 50 plus Erasmus+ KA2 Strategic Partnership KA200-2014-010 Crossing Borders (Denmark) Erasmus+ KA2 Strategic Partnership Erasmus+ KA2 Strategic Partnership 2014-1-AT01-KA201Kindervilla (Austria) 000977 2014-1-EL01-KA200- Active Citizens 001542 Partnership (Greece) FETE - From Expats to Experts:United Civil Society through Inclusion and Empowerment of Young Immugrants POLYGLOT- Multilingual education in preschool age LangMOOC Please insert rows as necessary. Please list other grant applications submitted by your organisation, or by any partner organisation in this project proposal. For each grant application, please mention the EU Programme concerned and the amount requested. Programme concerned Beneficiary Organisation Amount requested Please insert rows as necessary. Joint Master in Information Security and Data Management / (ISDM) Page 53 of 54 CHECK LIST Please make sure that you fully completed each part of this application form, as follows: ☐ ☐ ☐ ☐ ☐ ☐ ☐ PART D - Quality of the project team and the cooperation arrangements PART E - Project characteristics and relevance PART F - Quality of the project design and implementation PART G - Impact, dissemination and exploitation, sustainability ☐ Logical Framework Matrix ☐ Workplan PART H - Work packages PART I – Special Mobility Strand (where applicable) PART J - Other EU Grants Joint Master in Information Security and Data Management / (ISDM) Page 54 of 54
© Copyright 2026 Paperzz