Skip to main content
Meine Favoriten
Meine Favoriten

Publication database

Picture of various books and publications
Filter
Analysis

Die 5G-Debatte: ein Test für die digitale Souveränität Europas [The 5G debate: A test for Europe's digital sovereignty]

Analysen und Argumente
Isabel Skierka (2020)
Subject(s)
Strategy and general management; Technology, R&D management
Keyword(s)
Digital sovereignty, technology, EU, 5G, cybersecurity
For more than a year, EU member states have been debating whether and how to restrict the participation of the Chinese technology group Huawei in the expansion of their 5G mobile networks. Caught between its two main trading partners, the US and China, the EU is facing a geopolitical test on several levels. Will Europe be able to ensure the security and reliability of digital infrastructures of key economic and social importance? Will it lead the way in 5G and the associated next wave of industrialisation, or will lose out on innovation? How should EU member states deal with their dependence on foreign technologies and strengthen its "digital sovereignty", a political priority of the EU Commission under Ursula von der Leyen? The latter in particular could be the most important strategic challenge the EU has to face in the long term - especially in the context of the intensifying trade conflict between the US and China and the threat of a "decoupling" of technological supply chains.
[Über ein Jahr lang debattieren EU-Mitgliedsstaaten bereits darüber, ob und wie sie die Beteiligung des chinesischen Technologiekonzerns Huawei an dem Ausbau ihrer 5G-Mobilfunknetze einschränken sollen. Gefangen zwischen ihren beiden wichtigsten Handelspartnern, den USA und China, steht die EU vor einem geopolitischen Test auf mehreren Ebenen. Wird Europa langfristig in der Lage sein, die Sicherheit und Zuverlässigkeit digitaler Infrastrukturen von zentraler Bedeutung für Wirtschaft und Gesellschaft zu gewährleisten? Wird es bei 5G und der damit verbundenen nächsten Welle der Industrialisierung tonangebend sein oder weiter an Innovationskraft verlieren? Wie sollen die EU-Mitgliedsstaaten mit der Abhängigkeit von ausländischen Technologien umgehen und jene „digitale Souveränität“ erreichen, deren Stärkung eine der politischen Prioritäten der EU-Kommission unter Ursula von der Leyen ist? Insbesondere letztere könnte die wichtigste strategische Herausforderung sein, der sich die EU langfristig stellen muss – vor allem im Kontext des sich intensivierenden Handelskonflikts zwischen den USA und China und einer drohenden „Entkopplung“ technologischer Lieferketten.]
Pages
10
Journal Article

Why now is the time for “open innovation”

Harvard Business Review
Linus Dahlander, Martin Wallin (2020)
Subject(s)
Strategy and general management; Technology, R&D management
ISSN (Print)
0017-8012
Online article

Taking youth to the top

Forbes
Subject(s)
Diversity and inclusion; Ethics and social responsibility
Keyword(s)
sustainability, corporate responsibility, climate change, gender equality, diversity, millennials, stakeholder engagement
Our work as educators and researchers, we’ve noticed that two issues are more salient for #youngtalent than for many leaders at top companies: global warming and gender diversity. How can companies understand young people’s perspectives and gather their creative ideas for driving business and doing good?
ISSN (Print)
0015-6914
Online article

Does China really owe the world trillions of dollars?

Lawfare
Henning Christian Lahmann (2020)
Keyword(s)
COVID-19, WHO, international law, international responsibility, International Court of Justice, reparation, compensation, pandemic, International Health Regulations, no harm principle, causality
DSI Industrial & Policy Recommendations Series (IPR)

Konferenz Digitale Identitäten [Digital identity conference]

DSI Industrial & Policy Recommendations Series (IPR)
Martin Schallbruch, Tanja Strüve, Isabel Skierka (2020)
Subject(s)
Information technology and systems; Strategy and general management
Keyword(s)
Digitale Identitäten, E-Governance, Innovation, Digitalpolitik
Am 4. März 2020 war das Digital Society Institute der ESMT Gastgeber der Konferenz Digitale Identitäten 2020, die unter der Schirmherrschaft des Bundesministeriums des Innern, für Bau und Heimat sowie des Bundesministeriums für Wirtschaft und Energie an der ESMT ausgerichtet wurde. Ziel der Konferenz war es, gemeinsam mit Stakeholdern aus Politik, Wissenschaft und Wirtschaft der Frage nachzugehen, wie eine sektorübergreifende Strategie für digitale Identitäten aussehen kann. Im Plenum und in vier sektoralen Workshops – in den Bereichen Bildung, Gesundheit, Mobilität und öffentlicher Verwaltung – diskutierten die Teilnehmerinnen und Teilnehmer über Anforderungen an digitale Identitäten, innersektorale Strategien zur Flächendeckung innerhalb des Sektors sowie über eine Strategie für eine sektorübergreifende digitale Identität.


Pages
7
Analysis

5G and beyond: A test for “technological sovereignty” in Europe?

In The convergence puzzle: Australia, Germany and emerging cybersecurity trends, 3 vols. edited by Katja Theodorakis, 35–40. Barton, Australia: Konrad-Adenauer Foundation.
Isabel Skierka (2020)
Subject(s)
Strategy and general management; Technology, R&D management
Keyword(s)
5G, technological sovereignty, Europe, cybersecurity, industrial policy
The challenges that the EU faces with 5G go beyond cyber and national security threats. For Europe, the rollout of the 5G infrastructure has become a geopolitical test on several levels. Will Europe be a shaper or taker of 5G technology and the new era of industrialization it promises to propel? How will it be able to control the security and reliability of such key digital infrastructures in the long-term? Eventually, how should EU member states manage their dependencies on foreign technologies and strengthen their “technological sovereignty” – a political priority of the incoming EU Commission led by Ursula von der Leyen? The latter might be the most important strategic issue the EU will need to tackle in the long-term and will be decisive for the Union’s ability to shape its own future in the digital age.
Secondary Title
The convergence puzzle: Australia, Germany and emerging cybersecurity trends
Pages
35–40
Online article

Cyberattacks against hospitals during a pandemic and the case for an emergency regime for cyberspace

fifteeneightyfour
Henning Christian Lahmann (2020)
Subject(s)
Health and environment; Information technology and systems
Keyword(s)
COVID-19, pandemic, cyberattacks, necessity, attribution, rule of law, international law, hospitals
Conference Proceeding

Breaking the lightweight secure PUF: Understanding the relation of input transformations and machine learning resistance

Lecture Notes in Computer Science (LNCS) 11833: 40–54
Nils Wisiol, Georg T. Becker, Marian Margraf, Tudor A. A. Soroceanu, Johannes Tobisch, Benjamin Zengin (2020)
Subject(s)
Information technology and systems
Keyword(s)
Applications, Physically Unclonable Function, machine learning, modelling attack
Physical Unclonable Functions (PUFs) and, in particular, XOR Arbiter PUFs have gained much research interest as an authentication mechanism for embedded systems. One of the biggest problems of (strong) PUFs is their vulnerability to so called machine learning attacks. In this paper we take a closer look at one aspect of machine learning attacks that has not yet gained the needed attention: the generation of the sub-challenges in XOR Arbiter PUFs fed to the individual Arbiter PUFs. Specifically, we look at one of the most popular ways to generate sub-challenges based on a combination of permutations and XORs as it has been described for the "Lightweight Secure PUF". Previous research suggested that using such a sub-challenge generation increases the machine learning resistance significantly.
Our contribution in the field of sub-challenge generation is three-fold: First, drastically improving attack results by Rührmair et al., we describe a novel attack that can break the Lightweight Secure PUF in time roughly equivalent to an XOR Arbiter PUF without transformation of the challenge input. Second, we give a mathematical model that gives insight into the weakness of the Lightweight Secure PUF and provides a way to study generation of sub-challenges in general. Third, we propose a new, efficient, and cost-effective way for sub-challenge generation that mitigates the attack strategy we used and outperforms the Lightweight Secure PUF in both machine learning resistance and resource overhead.
Volume
11833
ISBN
978-3-030-42068-0
Journal Pages
40–54
Online article

In hiring, the less you know, the more you'll grow

Forbes
Subject(s)
Strategy and general management; Technology, R&D management
Keyword(s)
Learning-by-hiring, inter-firm mobility, innovation, patents
ISSN (Print)
0015-6914
Expert testimony paper

Stellungnahme: Anhörung im Deutschen Bundestag, Ausschuss Digitale Agenda, Anhörung "IT-Sicherheit von Hard- und Software als Voraussetzung für Digitale Souveränit" am 11.12.2019 [Testimony: Hearing in the German Bundestag, Digital Agenda Committee, hearing "IT security of hardware and software as a prerequisite for digital sovereignty" on 11.12.2019]

German Federal Parliament No. 19(23)080 (Digital Agenda Committee Paper)
Isabel Skierka (2020)
Subject(s)
Economics, politics and business environment; Information technology and systems; Technology, R&D management
Keyword(s)
IT-Security, Digital Sovereignty, Industrial policy
The public hearing of the Digital Agenda Committee on the topic of "IT security of hardware and software as a precondition for digital sovereignty" on Wednesday, December 11, 2019, analyzed how citizens, companies, but also public administration organizations in Germany are positioned with regard to digital sovereignty . The Committee led by Hansjörg Durz (CDU/CSU) focused primarily on the current state of Germany's IT infrastructure and governance, the need for legislative action, and security gaps.
In her statement, Isabel Skierka gives an assessment of Germany's industrial policy position in the field of digital technologies and the IT security situation and recommendations for strengthening digital sovereignty and IT security at the national and European level.

[Wie die Bürger, Unternehmen, aber auch die Verwaltung in Deutschland hinsichtlich der digitalen Souveränität aufgestellt sind, dazu gaben die Sachverständigen bei einer öffentlichen Anhörung des Ausschusses Digitale Agenda zum Thema „IT-Sicherheit von Hard- und Software als Voraussetzung für Digitale Souveränität“ am Mittwoch, 11. Dezember 2019, unterschiedliche Einschätzungen ab. Bei der Expertenbefragung unter Leitung von Hansjörg Durz (CDU/CSU) ging es vor allem um den Ist-Zustand der IT-Struktur Deutschlands, gesetzgeberischen Handlungsbedarf und Sicherheitslücken.
In ihrer Stellungnahme gibt Isabel Skierka eine Einsch¨ätzung zur industriepolitischen Stellung Deutschlands im Bereich digitaler Technologien sowie der IT-Sicherheitslage und Empfehlungen für die Stärkung digitaler Souveränität und der IT-Sicherheit auf nationaler und europäischer Ebene.]
Chatbox