Skip to content
Contact Us | Tel. +49 511 762 – 17715 | @: niederee[at]L3S.de
h2020mirror
  • Home
  • About
    • Collaborations and Synergies​
  • Work Plan
  • News
  • Consortium
  • Downloads
  • Publications
  • Contact
  • Toolkit
Menu Close
Toggle the button to expand or collapse the Menu
  • Home
  • About
    • Collaborations and Synergies​
  • Work Plan
  • News
  • Consortium
  • Downloads
  • Publications
  • Contact
  • Toolkit

Monthly Archives: September 2024

  1. Home>
  2. 2024>
  3. September>
  4. Page 3

Policy recommendations in the field of migration for Frontex

  • Post published:September 9, 2024
  • Post category:Human Rights/Toolkit

The following migration-related policy recommendations are proposed for Frontex:Establishing information and communication…

Continue ReadingPolicy recommendations in the field of migration for Frontex
Policy recommendations in the field of migration for Frontex

Policy recommendations in the field of migration for the European Parliament

  • Post published:September 9, 2024
  • Post category:Human Rights/Toolkit

The following migration-related policy recommendations are proposed for the European Parliament:The LIBE…

Continue ReadingPolicy recommendations in the field of migration for the European Parliament
Policy recommendations in the field of migration for the European Parliament

Policy recommendations in the field of migration for the European Council

  • Post published:September 9, 2024
  • Post category:Human Rights/Toolkit

The following migration-related policy recommendations are proposed for the European Council:Participate actively…

Continue ReadingPolicy recommendations in the field of migration for the European Council
Policy recommendations in the field of migration for the European Council

Policy recommendations in the field of migration for the European Commission

  • Post published:September 9, 2024
  • Post category:Human Rights/Toolkit

The following migration-related policy recommendations are proposed for the European Commission:Formally adopt…

Continue ReadingPolicy recommendations in the field of migration for the European Commission
Policy recommendations in the field of migration for the European Commission

Intelligence sharing in the context of border security

  • Post published:September 9, 2024
  • Post category:Threat Analysis/Toolkit

There are three different types of intelligence that can be shared by…

Continue ReadingIntelligence sharing in the context of border security
Intelligence sharing in the context of border security

Trends in intelligence sharing practices within the EU

  • Post published:September 9, 2024
  • Post category:Threat Analysis/Toolkit

The analysis carried out within the CRiTERIA project has revealed the following…

Continue ReadingTrends in intelligence sharing practices within the EU
Trends in intelligence sharing practices within the EU

Guidelines for improving threat actor analysis

  • Post published:September 9, 2024
  • Post category:Threat Analysis/Toolkit

One of the key challenges of analysis cross-border threats is the great…

Continue ReadingGuidelines for improving threat actor analysis
Guidelines for improving threat actor analysis

Recommendations on improving existing risk assessment frameworks in the field of irregular migration and human smuggling

  • Post published:September 6, 2024
  • Post category:Risk Assessment/Toolkit

There are different types of risk assessment tools used across the humanitarian…

Continue ReadingRecommendations on improving existing risk assessment frameworks in the field of irregular migration and human smuggling
Recommendations on improving existing risk assessment frameworks in the field of irregular migration and human smuggling

What are the key components of risk assessment in the field of migration?

  • Post published:September 6, 2024
  • Post category:Risk Assessment/Toolkit

Risk assessment regarding irregular migration involves identifying, analysing, and evaluating various risks…

Continue ReadingWhat are the key components of risk assessment in the field of migration?
What are the key components of risk assessment in the field of migration?

How is risk prioritization carried out?

  • Post published:September 6, 2024
  • Post category:Risk Assessment/Toolkit

A classic risk prioritization methodology includes five steps:Defining the scope: defining the…

Continue ReadingHow is risk prioritization carried out?
How is risk prioritization carried out?
  • Go to the previous page
  • 1
  • 2
  • 3
  • 4
  • Go to the next page

Recent Posts

  • Human Security Filter – Open-Source Information
  • Human Security Filter – Correlations
  • Human Security Filter – Composite Indicator
  • OSINT applications for law enforcement agencies
  • Introduction to OSINT for humanitarian practitioners

Recent Comments

    Archives

    • September 2024
    • June 2022
    • May 2022
    • April 2022
    • February 2022
    • January 2022
    • December 2021
    • November 2021
    • October 2021
    • August 2021
    • July 2021
    • June 2021
    • May 2021
    • April 2021
    • January 2021
    • November 2020
    • August 2020
    • April 2020
    • March 2020
    • November 2019
    • August 2019

    Categories

    • Automation
    • Events
    • Human Rights
    • Media Usage
    • News
    • OSINT
    • Perception Model
    • Publication
    • Risk Assessment
    • Threat Analysis
    • Toolkit
    • Training
    • Video

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org

    Migration-Related Risks Caused by Misconceptions of Opportunities and Requirement

    MIRROR has received funding from the European Union’s Horizon 2020 research and innovation action program under grant agreement No 832921.
    Follow us:
    Linkedin Twitter

    © All rights reserved

    Imprint | Privacy Policy

    Manage Cookie Consent
    We use cookies to optimize our website and our service.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}