Security Challenges to the Use and Deployment of Disruptive Technologies

Neil Robinson, Maarten Botterman, Lorenzo Valeri, David S. Ortiz, Andreas Ligtvoet, Rebecca Shoob, Edward Nason

ResearchPublished Jan 23, 2007

This report describes the results of a study undertaken for Unit A3, Internet, Information and Network Security, DG Information Society and Media, European Commission to investigate security challenges to the use and deployment of disruptive technologies. The project used a combination of research methods, most notably a Delphi™ exercise, case studies and a workshop to gather evidence on the type of security challenges that organisations implementing disruptive technologies encountered. Implementations of five different types of disruptive technology (defined by Clayton M Christiansen as technology or innovation that attracts a customer base via niche or simple selling points) were considered. These were Voice over IP (VoIP); Trusted Computing; Wireless Microwave Access (WiMAX); Radio Frequency Identification (RFID) and Internet Protocol version 6 (IPv6). The analysis from the case studies indicated a wide variety of issues but that the disruptive nature of these technologies did not present any unique or peculiar security challenges. The report also presented conclusions for policy makers at the European and Member State level based on the evidence gathered and other literature which indicated, amongst other things, that a program to monitor the impact of technological research and development would be a useful policy measure.

Topics

Document Details

  • Availability: Web-Only
  • Year: 2007
  • Pages: 120
  • Document Number: TR-406-EC

Citation

RAND Style Manual
Robinson, Neil, Maarten Botterman, Lorenzo Valeri, David S. Ortiz, Andreas Ligtvoet, Rebecca Shoob, and Edward Nason, Security Challenges to the Use and Deployment of Disruptive Technologies, RAND Corporation, TR-406-EC, 2007. As of October 10, 2024: https://www.rand.org/pubs/technical_reports/TR406.html
Chicago Manual of Style
Robinson, Neil, Maarten Botterman, Lorenzo Valeri, David S. Ortiz, Andreas Ligtvoet, Rebecca Shoob, and Edward Nason, Security Challenges to the Use and Deployment of Disruptive Technologies. Santa Monica, CA: RAND Corporation, 2007. https://www.rand.org/pubs/technical_reports/TR406.html.
BibTeX RIS

Research conducted by

The research described in this paper was prepared for the European Commission and was conducted by RAND Europe.

This publication is part of the RAND technical report series. RAND technical reports, products of RAND from 2003 to 2011, presented research findings on a topic limited in scope or intended for a narrow audience; discussions of the methodology employed in research; literature reviews, survey instruments, modeling exercises, guidelines for practitioners and research professionals, and supporting documentation; and preliminary findings. All RAND technical reports were subject to rigorous peer review to ensure high standards for research quality and objectivity.

This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited; linking directly to this product page is encouraged. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial purposes. For information on reprint and reuse permissions, please visit www.rand.org/pubs/permissions.

RAND is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.