In order to close the research and innovation gap between the European Member States, the Commission has designed the Spreading Excellence and Widening Participation strategy. Measures supported under this strategy will help low R&I performing EU countries to increase their participation in Horizon Europe.
There is a wide range of actions that can be used to achieve this objective from enhancing research and innovation capacity, spurring national reforms, facilitating brain circulation, launching measures for promoting excellence to creating new collaborative networks across the EU and supporting the opening of established networks to applicants from widening countries.
The 2023-2024 Work Programme will include four traditional widening instruments in addition to a number of novel elements included in the advancing Europe package agreed by the legislators in March 2019 to create impact on the above mentioned actions:
manhei.to@fwo.be
+32 2 550 15 55
Infosheets contain edited content on aspects related to this programme. They are reviewed at least yearly.
Related links are easy pointers towards external information. We curate the list, but are not liable for the destinations.
Documents contain additional information related to this programme, and are similar to related links.
The EITHOS project, funded under Horizon Europe Cluster 3 call “Online identity theft is countered”, aims to develop a “European Identity Theft Observatory System” (EITHOS). The system will provide easy access to information and intelligence about previous and current identity theft related trends to empower EU citizens, Law Enforcements Agencies (LEAs), and policy makers to further contribute to the prevention, detection, and investigation of crimes related to online identity theft. The Cyber and Data Security Lab (CDSL), part of the Law, Science, Technology and Society (LSTS) Research Group at Vrije Universiteit Brussel (VUB), is one of the 12 partners in the EITHOS consortium, contributing its vast expertise on legal aspects of data protection, cybersecurity and information security law and policy.