Skip to main content

DSI Publications

Argument

The great anti-China tech alliance

Foreign Policy
Andrew Grotto, Martin Schallbruch (2019)
Subject(s)
Information technology and systems; Technology, R&D management
Keyword(s)
China, privacy, cybersecurity, transatlantic relationship
China, Europe, and the United States are competing over whose image will be most reflected in rules and normst hat define digital markets. Regulatory measures such as Europe’s GDPR and China’s Cybersecurity Law combine privacy, security, and safety regulation. Driving factors are security policy as well as industry and trade policy. With China pulling into the pole position in the digital technology race, it is time for the United States and Europe to forge a digital governance alliance
Report

A new competition framework for the digital economy

Report by the Commission ‘Competition Law 4.0’
Martin Schallbruch, Heike Schweizer, Achim Wambach (2019)
Subject(s)
Information technology and systems; Technology, R&D management
Keyword(s)
Competition law, antitrust law, digital platforms, data access
The Commission “‘Competition Law 4.0’” was set up by the German Federal Minister for Economic Affairs and Energy with the task to draw up recommendations for the further development of EU competition law in the light of the digital economy. The final report with 22 recommendations was handed over in September 2019.
The commission finds that the practical and actual power of consumers to dispose of their own data must be improved, clear rules of conduct for dominant platforms must be introduced, legal certainty for cooperation in the digital sector must be enhanced, and the institutional linkage between competition law and other digital regulation must be strengthened.
Pages
88
Book

Rechtsfragen bei Open Science [Legal Questions Concerning Open Science]

Hamburg: Hamburg University Press
Henning Christian Lahmann, Till Kreutzer (2019)
Subject(s)
Information technology and systems; Technology, R&D management
Keyword(s)
open science, open educational resources, law, copyright law, data protection, privacy
The book provides an overview of legal questions in regard to open science, with a particular focus on issues of copyright and data protection.
Pages
156
ISBN
978-3-943423-66-2
ISBN (Online)
978-3-943423-67-9
Book Chapter

Digitale Souveränität durch rechtliche Gestaltung von Technik? [Digital sovereignty through regulatory shaping of technology?]

In Brauchen wir eine neue Staatskunst?, edited by Henning Lühr, 182–192. Bremen: Kellner Verlag.
Martin Schallbruch (2019)
Subject(s)
Economics, politics and business environment
Keyword(s)
Digital transformation, sovereignty, lawmaking
The article addresses the question of the digital dependencies of the public sector and the way in which government performs its tasks in the digital sphere. It examines the use of ICT and digital platforms, the development of digital competencies in public authorities and the overall ability to manage digital sovereignty. In particular, it highlights the role of the law and proposes three approaches for shaping regulation to strengthen digital sovereignty.

[Der Beitrag beschäftigt sich mit der Frage der Abhängigkeiten des Staates und staatlicher Aufgabenerfüllung im digitalen Raum. Er untersucht die Nutzung von IKT und digitalen Plattformen, die Kompetenzentwicklung in Behörden und die übergreifende Fähigkeit zum Management digitaler Souveränität. Besonders intensiv beleuchtet er die Rolle des Rechts und schlägt drei Ansätze vor, die Weiterentwicklung der Regulierung zur Stärkung digitaler Souveränität zu nutzen.]
Secondary Title
Brauchen wir eine neue Staatskunst?
Pages
182–192
ISBN
978-3-95651-211-7
Conference Proceeding

In­sights into the mind of a tro­jan de­si­gner: The chal­len­ge to in­te­gra­te a tro­jan into the bit­stream

ASPDAC'19 Proceedings
Maik Ender, Pawel Swierczynski, Sebastian Wallat, Matthias Wilhelm, Paul Martin Knopp, Christof Paar (2019)
Subject(s)
Information technology and systems
Keyword(s)
Hardware reverse engineering, malicious design modifications, embedded systems security
The thre­at of in­s­er­ting hard­ware Tro­jans du­ring the de­sign, pro­duc­tion, or in-field poses a dan­ger for in­te­gra­ted cir­cuits in re­al-world ap­p­li­ca­ti­ons. A par­ti­cu­lar cri­ti­cal case of hard­ware Tro­jans is the ma­li­cious ma­ni­pu­la­ti­on of third-par­ty FPGA con­fi­gu­ra­ti­ons. In ad­di­ti­on to at­tack vec­tors du­ring the de­sign pro­cess, FPGAs can be in­fil­tra­ted in a non-in­va­si­ve man­ner after ship­ment through al­te­ra­ti­ons of the bit­stream. First, we pre­sent an im­pro­ved me­tho­do­lo­gy for bit­stream file for­mat re­ver­sing. Se­cond, we in­tro­du­ce a novel idea for Tro­jan in­s­er­ti­on.
Journal Pages
112–119
Conference Proceeding

Attack simulation for a realistic evaluation and comparison of network security techniques

In Secure IT systems, 1st ed., 11252 vols. 236–254. Olso, Norway: Springer International Publishing.
23rd Nordic Conference, NordSec 2018, Oslo, Norway, Proceedings
2018 Other
Alexander Bajic, Georg T. Becker (2018)
Subject(s)
Information technology and systems
Keyword(s)
Moving target defense, attack simulation, attack graphs, network modeling
Secondary Title
Secure IT systems
Edition
1st ed.,
Pages
236–254
DSI Industrial & Policy Recommendations Series (IPR)

Anforderungen an eine "Nationale Blockchain-Strategie" [Requirements for a German "Blockchain Strategy"]

DSI Industrial & Policy Recommendations Series (IPR)
Isabel Skierka, Martin Schallbruch (2018)
Subject(s)
Economics, politics and business environment; Information technology and systems; Technology, R&D management
Keyword(s)
Blockchain, distributed ledger, strategy, policy, innovation
In its 2018 coalition agreement, the German federal government has set itself the goal of adopting a "Blockchain strategy" in this legislative period. As part of the planned promotion of Distributed Ledger and Blockchain technologies, the government wants to create a framework for the development and application of these technologies and test them in public administration. The Federal Ministry of Economics and Energy and the Federal Ministry of Finance are jointly in charge of developing the strategy. On this occasion, in a workshop on 3 July 2018 at the Digital Society Institute of ESMT Berlin, 35 experts from politics, business and science discussed how a national blockchain strategy can be practically organized. The discussion focused on the questions of what goals such a strategy should have, what the central enablers and appropriate framework conditions for the development and application of Distributed Ledger technologies such as blockchain can be in Germany, and what role the state plays in promoting the technology and managing risks in this technology field. Sarah Basic and André Eid (Federal Ministry for Economic Affairs and Energy), Dr. Christian Hampel (Ernst & Young GmbH), Dr. Jürgen Kohr (Fujitsu), Dr. Manfred Lochter (Federal Office for Security in Information Technology) and Kai Wagner (Jolocom) gave input speeches to the debate. Based on the workshop discussion, this paper outlines requirements for a national blockchain strategy. [Die Bundesregierung hat sich in ihrem Koalitionsvertrag das Ziel gesetzt, in dieser Legislaturperiode eine „Blockchain-Strategie“ zu verabschieden. Im Rahmen der geplanten Förderung von Distributed Ledger und Blockchain Technologien sollen die Rahmenbedingungen für Entwicklung und Einsatz der Technologien verbessert und diese auch in der öffentlichen Verwaltung erprobt werden. Mit der Erarbeitung der Strategie sind federführend das Bundesministerium für Wirtschaft und Energie (BMWi) und das Bundesministerium der Finanzen (BMF) betraut. Aus diesem Anlass erörterten in einem Workshop am 3. Juli 2018 am Digital Society Institute der ESMT Berlin 35 Experten aus Politik, Wirtschaft und Wissenschaft, wie eine nationale Blockchain-Strategie praktisch organisiert sein kann. Im Zentrum der Diskussion standen die Fragen, welche Ziele eine solche Strategie haben sollte, was zentrale Ermöglicher und geeignete Rahmenbedingungen für die Entwicklung und Anwendung von Distributed Ledger Technologien wie Blockchain in Deutschland sein können, und welche Rolle dem Staat bei der Förderung und Bekämpfung von Risiken in diesem Technologiefeld zukommt. Impulsvorträge für die Diskussion hielten Sarah Basic und André Eid (Bundesministerium für Wirtschaft und Energie), Dr. Christian Hampel (Ernst & Young GmbH), Dr. Jürgen Kohr (Fujitsu), Dr. Manfred Lochter (Bundesamt für Sicherheit in der Informationstechnik) und Kai Wagner (Jolocom). Auf der Grundlage der Workshop-Diskussion skizziert dieses Papier Anforderungen an eine nationale Blockchain-Strategie.]
Pages
14
Book Review

IT-Sicherheitsrecht [IT-security law]

Review of Buchbesprechungen. Paul Voigt, IT-Sicherheitsrecht, Cologne: Computer und Recht
Martin Schallbruch (2018)
Subject(s)
Information technology and systems; Technology, R&D management
Keyword(s)
Cybersecurity, information security
Book review of Paul Voigt, “IT-Sicherheitsrecht”, (IT security law), 2018
Secondary Title
Buchbesprechungen. Paul Voigt, IT-Sicherheitsrecht
Journal Pages
r81–r81
Book

Cybersecurity in Germany

SpringerBriefs in Cybersecurity, 1st ed.,New York City, New York: Springer
Martin Schallbruch, Isabel Skierka (2018)
Subject(s)
Economics, politics and business environment; Information technology and systems
Keyword(s)
Cybersecurity, cyber defense, critical infrastructure protection, digital sovereignty, data protection, policy, strategy, regulation
JEL Code(s)
K24, N44, O25, O38
With the digitization of nearly all aspects of life, our societies increasingly depend on the resilience and security of computing and communication technologies. Hence, the protection of information technology (IT) against unauthorized access, attack, and accidental failure, has become a priority for nation-states around the world. Throughout the past one or two decades, most countries have adopted strategies, policies, and practical steps to protect the security of IT and critical infrastructures within their territory, and, by extension, their citizens. These practices are generally subsumed under the umbrella of cybersecurity. The book provides an analysis of the evolution of cybersecurity policy in Germany over the past two and a half decades. It highlights development lines as well as upcoming strategic challenges of the German cybersecurity policy.
Volume
1st ed.,
Pages
76
ISBN
978-3-319-90013-1
ISBN (Online)
978-3-319-90014-8
Journal Article

Systematisierung des IT-Sicherheitsrechts. Ein Beitrag zu einem konstruktiven Strukturentwurf [Systematization of IT security law: A contribution to a structural design]

Computer und Recht 34 (11): 706–720
Oliver Raabe, Martin Schallbruch, Anne Steinbrück (2018)
Subject(s)
Information technology and systems; Technology, R&D management
Keyword(s)
Cybersecurity, information security, legislation, risk management
With the increasing importance of the security of information technology for all areas of life, the IT security law has developed step by step without the European and German legislation being able to follow an overall draft. At the latest with the IT security regulations in the General Data Protection Regulation and the expansion of sector-specific regulations on IT security, questions of the systematization of the new area of law arise. The authors examine three key questions - the modeling of systems subject to the law, the concept of risk management, and the determination of the state of the art security measures. Finally, they outline the main elements of a restructuring of IT security law. [Das IT-Sicherheitsrecht will die IT-Sicherheit schützen, folgt aber weder auf europäischer noch auf deutscher Gesetzgebungsebene einem Gesamtentwurf. Der Beitrag geht drei Schlüsselfragen nach – der Modellierung der dem Recht unterworfenen Systeme (II.), dem Risikobegriff (III.) sowie der Ermittlung des Standes der Technik (IV.) – und entwirft Grundzüge einer Strukturierung des IT-Sicherheitsrechts (V.).]
Volume
34
Journal Pages
706–720
ISSN (Online)
2194-4172