Download eBook for Free

Full Document

FormatFile SizeNotes
PDF file 0.7 MB

Use Adobe Acrobat Reader version 10 or higher for the best experience.

Summary Only

FormatFile SizeNotes
PDF file 0.1 MB

Use Adobe Acrobat Reader version 10 or higher for the best experience.

This report describes the results of a study undertaken for Unit A3, Internet, Information and Network Security, DG Information Society and Media, European Commission to investigate security challenges to the use and deployment of disruptive technologies. The project used a combination of research methods, most notably a Delphi™ exercise, case studies and a workshop to gather evidence on the type of security challenges that organisations implementing disruptive technologies encountered. Implementations of five different types of disruptive technology (defined by Clayton M Christiansen as technology or innovation that attracts a customer base via niche or simple selling points) were considered. These were Voice over IP (VoIP); Trusted Computing; Wireless Microwave Access (WiMAX); Radio Frequency Identification (RFID) and Internet Protocol version 6 (IPv6). The analysis from the case studies indicated a wide variety of issues but that the disruptive nature of these technologies did not present any unique or peculiar security challenges. The report also presented conclusions for policy makers at the European and Member State level based on the evidence gathered and other literature which indicated, amongst other things, that a program to monitor the impact of technological research and development would be a useful policy measure.

Table of Contents

  • Chapter One

    Introduction

  • Chapter Two

    Voice over Internet Protocol (VoIP)

  • Chapter Three

    Trusted Computing

  • Chapter Four

    Wireless Microwave Access (WiMAX)

  • Chapter Five

    Radio Frequency Identification (RFID)

  • Chapter Six

    Internet Protocol version 6 (IPv6)

  • Appendix A

    Case Study Framework

  • Appendix B

    Case Study Interviewees

  • Appendix C

    Terms of Reference for Final Workshop

  • Appendix D

    Final Workshop participants

  • Appendix E

    Glossary

Research conducted by

The research described in this paper was prepared for the European Commission and was conducted by RAND Europe.

This report is part of the RAND Corporation technical report series. RAND technical reports may include research findings on a specific topic that is limited in scope or intended for a narrow audience; present discussions of the methodology employed in research; provide literature reviews, survey instruments, modeling exercises, guidelines for practitioners and research professionals, and supporting documentation; or deliver preliminary findings. All RAND reports undergo rigorous peer review to ensure that they meet high standards for research quality and objectivity.

Permission is given to duplicate this electronic document for personal use only, as long as it is unaltered and complete. Copies may not be duplicated for commercial purposes. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. For information on reprint and linking permissions, please visit the RAND Permissions page.

The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.