Cover: Security Challenges to the Use and Deployment of Disruptive Technologies

Security Challenges to the Use and Deployment of Disruptive Technologies

Published Jan 23, 2007

by Neil Robinson, Maarten Botterman, Lorenzo Valeri, David S. Ortiz, Andreas Ligtvoet, Rebecca Shoob, Edward Nason

Download eBook for Free

Full Document

FormatFile SizeNotes
PDF file 0.7 MB

Use Adobe Acrobat Reader version 10 or higher for the best experience.

Summary Only

FormatFile SizeNotes
PDF file 0.1 MB

Use Adobe Acrobat Reader version 10 or higher for the best experience.

This report describes the results of a study undertaken for Unit A3, Internet, Information and Network Security, DG Information Society and Media, European Commission to investigate security challenges to the use and deployment of disruptive technologies. The project used a combination of research methods, most notably a Delphi™ exercise, case studies and a workshop to gather evidence on the type of security challenges that organisations implementing disruptive technologies encountered. Implementations of five different types of disruptive technology (defined by Clayton M Christiansen as technology or innovation that attracts a customer base via niche or simple selling points) were considered. These were Voice over IP (VoIP); Trusted Computing; Wireless Microwave Access (WiMAX); Radio Frequency Identification (RFID) and Internet Protocol version 6 (IPv6). The analysis from the case studies indicated a wide variety of issues but that the disruptive nature of these technologies did not present any unique or peculiar security challenges. The report also presented conclusions for policy makers at the European and Member State level based on the evidence gathered and other literature which indicated, amongst other things, that a program to monitor the impact of technological research and development would be a useful policy measure.

Research conducted by

The research described in this paper was prepared for the European Commission and was conducted by RAND Europe.

This report is part of the RAND technical report series. RAND technical reports may include research findings on a specific topic that is limited in scope or intended for a narrow audience; present discussions of the methodology employed in research; provide literature reviews, survey instruments, modeling exercises, guidelines for practitioners and research professionals, and supporting documentation; or deliver preliminary findings. All RAND reports undergo rigorous peer review to ensure that they meet high standards for research quality and objectivity.

This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited; linking directly to this product page is encouraged. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial purposes. For information on reprint and reuse permissions, please visit

RAND is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.