Skip to main content
đŸ”ïžŽ
Programs
Topics · Experience level
đŸŽšïžŽ
Programs
Programs
Topics
Topics
Experience level
Experience level
cancel

Publication database

Picture of various books and publications
Filter
Analysis

Die 5G-Debatte: ein Test fĂŒr die digitale SouverĂ€nitĂ€t Europas [The 5G debate: A test for Europe's digital sovereignty]

Analysen und Argumente
Isabel Skierka (2020)
Subject(s)
Strategy and general management; Technology, R&D management
Keyword(s)
Digital sovereignty, technology, EU, 5G, cybersecurity
For more than a year, EU member states have been debating whether and how to restrict the participation of the Chinese technology group Huawei in the expansion of their 5G mobile networks. Caught between its two main trading partners, the US and China, the EU is facing a geopolitical test on several levels. Will Europe be able to ensure the security and reliability of digital infrastructures of key economic and social importance? Will it lead the way in 5G and the associated next wave of industrialisation, or will lose out on innovation? How should EU member states deal with their dependence on foreign technologies and strengthen its "digital sovereignty", a political priority of the EU Commission under Ursula von der Leyen? The latter in particular could be the most important strategic challenge the EU has to face in the long term - especially in the context of the intensifying trade conflict between the US and China and the threat of a "decoupling" of technological supply chains.
[Über ein Jahr lang debattieren EU-Mitgliedsstaaten bereits darĂŒber, ob und wie sie die Beteiligung des chinesischen Technologiekonzerns Huawei an dem Ausbau ihrer 5G-Mobilfunknetze einschrĂ€nken sollen. Gefangen zwischen ihren beiden wichtigsten Handelspartnern, den USA und China, steht die EU vor einem geopolitischen Test auf mehreren Ebenen. Wird Europa langfristig in der Lage sein, die Sicherheit und ZuverlĂ€ssigkeit digitaler Infrastrukturen von zentraler Bedeutung fĂŒr Wirtschaft und Gesellschaft zu gewĂ€hrleisten? Wird es bei 5G und der damit verbundenen nĂ€chsten Welle der Industrialisierung tonangebend sein oder weiter an Innovationskraft verlieren? Wie sollen die EU-Mitgliedsstaaten mit der AbhĂ€ngigkeit von auslĂ€ndischen Technologien umgehen und jene „digitale SouverĂ€nitĂ€t“ erreichen, deren StĂ€rkung eine der politischen PrioritĂ€ten der EU-Kommission unter Ursula von der Leyen ist? Insbesondere letztere könnte die wichtigste strategische Herausforderung sein, der sich die EU langfristig stellen muss – vor allem im Kontext des sich intensivierenden Handelskonflikts zwischen den USA und China und einer drohenden „Entkopplung“ technologischer Lieferketten.]
Pages
10
Journal Article

Why now is the time for “open innovation”

Harvard Business Review
Linus Dahlander, Martin Wallin (2020)
Subject(s)
Strategy and general management; Technology, R&D management
ISSN (Print)
0017-8012
Online article

Taking youth to the top

Forbes
Subject(s)
Diversity and inclusion; Ethics and social responsibility
Keyword(s)
sustainability, corporate responsibility, climate change, gender equality, diversity, millennials, stakeholder engagement
Our work as educators and researchers, we’ve noticed that two issues are more salient for #youngtalent than for many leaders at top companies: global warming and gender diversity. How can companies understand young people’s perspectives and gather their creative ideas for driving business and doing good?
ISSN (Print)
0015-6914
Online article

Does China really owe the world trillions of dollars?

Lawfare
Henning Christian Lahmann (2020)
Keyword(s)
COVID-19, WHO, international law, international responsibility, International Court of Justice, reparation, compensation, pandemic, International Health Regulations, no harm principle, causality
DSI Industrial & Policy Recommendations Series (IPR)

Konferenz Digitale IdentitÀten [Digital identity conference]

DSI Industrial & Policy Recommendations Series (IPR)
Martin Schallbruch, Tanja StrĂŒve, Isabel Skierka (2020)
Subject(s)
Information technology and systems; Strategy and general management
Keyword(s)
Digitale IdentitÀten, E-Governance, Innovation, Digitalpolitik
Am 4. März 2020 war das Digital Society Institute der ESMT Gastgeber der Konferenz Digitale Identitäten 2020, die unter der Schirmherrschaft des Bundesministeriums des Innern, für Bau und Heimat sowie des Bundesministeriums für Wirtschaft und Energie an der ESMT ausgerichtet wurde. Ziel der Konferenz war es, gemeinsam mit Stakeholdern aus Politik, Wissenschaft und Wirtschaft der Frage nachzugehen, wie eine sektorübergreifende Strategie für digitale Identitäten aussehen kann. Im Plenum und in vier sektoralen Workshops – in den Bereichen Bildung, Gesundheit, Mobilität und öffentlicher Verwaltung – diskutierten die Teilnehmerinnen und Teilnehmer über Anforderungen an digitale Identitäten, innersektorale Strategien zur Flächendeckung innerhalb des Sektors sowie über eine Strategie für eine sektorübergreifende digitale Identität.


Pages
7
Analysis

5G and beyond: A test for “technological sovereignty” in Europe?

In The convergence puzzle: Australia, Germany and emerging cybersecurity trends, 3 vols. edited by Katja Theodorakis, 35–40. Barton, Australia: Konrad-Adenauer Foundation.
Isabel Skierka (2020)
Subject(s)
Strategy and general management; Technology, R&D management
Keyword(s)
5G, technological sovereignty, Europe, cybersecurity, industrial policy
The challenges that the EU faces with 5G go beyond cyber and national security threats. For Europe, the rollout of the 5G infrastructure has become a geopolitical test on several levels. Will Europe be a shaper or taker of 5G technology and the new era of industrialization it promises to propel? How will it be able to control the security and reliability of such key digital infrastructures in the long-term? Eventually, how should EU member states manage their dependencies on foreign technologies and strengthen their “technological sovereignty” – a political priority of the incoming EU Commission led by Ursula von der Leyen? The latter might be the most important strategic issue the EU will need to tackle in the long-term and will be decisive for the Union’s ability to shape its own future in the digital age.
Secondary Title
The convergence puzzle: Australia, Germany and emerging cybersecurity trends
Pages
35–40
Online article

Cyberattacks against hospitals during a pandemic and the case for an emergency regime for cyberspace

fifteeneightyfour
Henning Christian Lahmann (2020)
Subject(s)
Health and environment; Information technology and systems
Keyword(s)
COVID-19, pandemic, cyberattacks, necessity, attribution, rule of law, international law, hospitals
Conference Proceeding

Breaking the lightweight secure PUF: Understanding the relation of input transformations and machine learning resistance

Lecture Notes in Computer Science (LNCS) 11833: 40–54
Nils Wisiol, Georg T. Becker, Marian Margraf, Tudor A. A. Soroceanu, Johannes Tobisch, Benjamin Zengin (2020)
Subject(s)
Information technology and systems
Keyword(s)
Applications, Physically Unclonable Function, machine learning, modelling attack
Physical Unclonable Functions (PUFs) and, in particular, XOR Arbiter PUFs have gained much research interest as an authentication mechanism for embedded systems. One of the biggest problems of (strong) PUFs is their vulnerability to so called machine learning attacks. In this paper we take a closer look at one aspect of machine learning attacks that has not yet gained the needed attention: the generation of the sub-challenges in XOR Arbiter PUFs fed to the individual Arbiter PUFs. Specifically, we look at one of the most popular ways to generate sub-challenges based on a combination of permutations and XORs as it has been described for the "Lightweight Secure PUF". Previous research suggested that using such a sub-challenge generation increases the machine learning resistance significantly.
Our contribution in the field of sub-challenge generation is three-fold: First, drastically improving attack results by RĂŒhrmair et al., we describe a novel attack that can break the Lightweight Secure PUF in time roughly equivalent to an XOR Arbiter PUF without transformation of the challenge input. Second, we give a mathematical model that gives insight into the weakness of the Lightweight Secure PUF and provides a way to study generation of sub-challenges in general. Third, we propose a new, efficient, and cost-effective way for sub-challenge generation that mitigates the attack strategy we used and outperforms the Lightweight Secure PUF in both machine learning resistance and resource overhead.
Volume
11833
ISBN
978-3-030-42068-0
Journal Pages
40–54
Online article

In hiring, the less you know, the more you'll grow

Forbes
Subject(s)
Strategy and general management; Technology, R&D management
Keyword(s)
Learning-by-hiring, inter-firm mobility, innovation, patents
ISSN (Print)
0015-6914
Expert testimony paper

Stellungnahme: Anhörung im Deutschen Bundestag, Ausschuss Digitale Agenda, Anhörung "IT-Sicherheit von Hard- und Software als Voraussetzung fĂŒr Digitale SouverĂ€nit" am 11.12.2019 [Testimony: Hearing in the German Bundestag, Digital Agenda Committee, hearing "IT security of hardware and software as a prerequisite for digital sovereignty" on 11.12.2019]

German Federal Parliament No. 19(23)080 (Digital Agenda Committee Paper)
Isabel Skierka (2020)
Subject(s)
Economics, politics and business environment; Information technology and systems; Technology, R&D management
Keyword(s)
IT-Security, Digital Sovereignty, Industrial policy
The public hearing of the Digital Agenda Committee on the topic of "IT security of hardware and software as a precondition for digital sovereignty" on Wednesday, December 11, 2019, analyzed how citizens, companies, but also public administration organizations in Germany are positioned with regard to digital sovereignty . The Committee led by Hansjörg Durz (CDU/CSU) focused primarily on the current state of Germany's IT infrastructure and governance, the need for legislative action, and security gaps.
In her statement, Isabel Skierka gives an assessment of Germany's industrial policy position in the field of digital technologies and the IT security situation and recommendations for strengthening digital sovereignty and IT security at the national and European level.

[Wie die BĂŒrger, Unternehmen, aber auch die Verwaltung in Deutschland hinsichtlich der digitalen SouverĂ€nitĂ€t aufgestellt sind, dazu gaben die SachverstĂ€ndigen bei einer öffentlichen Anhörung des Ausschusses Digitale Agenda zum Thema „IT-Sicherheit von Hard- und Software als Voraussetzung fĂŒr Digitale SouverĂ€nitĂ€t“ am Mittwoch, 11. Dezember 2019, unterschiedliche EinschĂ€tzungen ab. Bei der Expertenbefragung unter Leitung von Hansjörg Durz (CDU/CSU) ging es vor allem um den Ist-Zustand der IT-Struktur Deutschlands, gesetzgeberischen Handlungsbedarf und SicherheitslĂŒcken.
In ihrer Stellungnahme gibt Isabel Skierka eine EinschšÀtzung zur industriepolitischen Stellung Deutschlands im Bereich digitaler Technologien sowie der IT-Sicherheitslage und Empfehlungen fĂŒr die StĂ€rkung digitaler SouverĂ€nitĂ€t und der IT-Sicherheit auf nationaler und europĂ€ischer Ebene.]