Download eBook for Free
Full Document
Format | File Size | Notes |
---|---|---|
PDF file | 0.7 MB | Use Adobe Acrobat Reader version 10 or higher for the best experience. |
Summary Only
Format | File Size | Notes |
---|---|---|
PDF file | 0.1 MB | Use Adobe Acrobat Reader version 10 or higher for the best experience. |
This report describes the results of a study undertaken for Unit A3, Internet, Information and Network Security, DG Information Society and Media, European Commission to investigate security challenges to the use and deployment of disruptive technologies. The project used a combination of research methods, most notably a Delphi™ exercise, case studies and a workshop to gather evidence on the type of security challenges that organisations implementing disruptive technologies encountered. Implementations of five different types of disruptive technology (defined by Clayton M Christiansen as technology or innovation that attracts a customer base via niche or simple selling points) were considered. These were Voice over IP (VoIP); Trusted Computing; Wireless Microwave Access (WiMAX); Radio Frequency Identification (RFID) and Internet Protocol version 6 (IPv6). The analysis from the case studies indicated a wide variety of issues but that the disruptive nature of these technologies did not present any unique or peculiar security challenges. The report also presented conclusions for policy makers at the European and Member State level based on the evidence gathered and other literature which indicated, amongst other things, that a program to monitor the impact of technological research and development would be a useful policy measure.
Table of Contents
Chapter One
Introduction
Chapter Two
Voice over Internet Protocol (VoIP)
Chapter Three
Trusted Computing
Chapter Four
Wireless Microwave Access (WiMAX)
Chapter Five
Radio Frequency Identification (RFID)
Chapter Six
Internet Protocol version 6 (IPv6)
Appendix A
Case Study Framework
Appendix B
Case Study Interviewees
Appendix C
Terms of Reference for Final Workshop
Appendix D
Final Workshop participants
Appendix E
Glossary
Research conducted by
The research described in this paper was prepared for the European Commission and was conducted by RAND Europe.
This report is part of the RAND Corporation Technical report series. RAND technical reports may include research findings on a specific topic that is limited in scope or intended for a narrow audience; present discussions of the methodology employed in research; provide literature reviews, survey instruments, modeling exercises, guidelines for practitioners and research professionals, and supporting documentation; or deliver preliminary findings. All RAND reports undergo rigorous peer review to ensure that they meet high standards for research quality and objectivity.
This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited; linking directly to this product page is encouraged. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial purposes. For information on reprint and reuse permissions, please visit www.rand.org/pubs/permissions.
The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.