\
&
Contact us
Published on | 1 year ago
Programmes HealthThe Innovative Health Initiative (IHI) has published the draft texts of topics under consideration for inclusion in the next calls for proposals on the Future Opportunities page of the website. Currently, the draft topics are under consultation and it is therefore likely that the topics may change between now and the call launch, and applicants should check the final, approved topic texts once the calls are launched.
Herewith the draft text of what is under consideration for inclusion in IHI call 9, a single-stage, applicant driven call which will be launched in early 2025: draft call 9 text.
Herewith an overview of the draft topics which are under consideration for inclusion in IHI call 10, a standard two-stage call which will be launched in early 2025:
More information is available on the IHI website.
We offer news and event updates, covering all domains and topics of Horizon Europe, Digital Europe & EDF (and occasionally, for ongoing projects, Horizon 2020).
Stay informed about what matters to you.
By signing up, you can opt in for e-mail notifications and get access to
a personalised dashboard that groups all news updates and event announcements in your domain(s).
Only for stakeholders located in Flanders
The EITHOS project, funded under Horizon Europe Cluster 3 call “Online identity theft is countered”, aims to develop a “European Identity Theft Observatory System” (EITHOS). The system will provide easy access to information and intelligence about previous and current identity theft related trends to empower EU citizens, Law Enforcements Agencies (LEAs), and policy makers to further contribute to the prevention, detection, and investigation of crimes related to online identity theft. The Cyber and Data Security Lab (CDSL), part of the Law, Science, Technology and Society (LSTS) Research Group at Vrije Universiteit Brussel (VUB), is one of the 12 partners in the EITHOS consortium, contributing its vast expertise on legal aspects of data protection, cybersecurity and information security law and policy.