Future Diffusion of PK1-Technology — A German Delphi Study

  • Michael Gaude


This article provides a contribution to innovation research in the field of electronic signatures, particularly to the future development of the aspects of diffusion throughout the IT-technology of the “Public Key Infrastructure” (PKI). In the modern Internet economy, PKI-technology is generally seen as the basis for obligatory authentication and safe communication. Nowadays, large scale enterprises in particular want to reach concensus concerning this security technology. In this article, the key factors for the future development of PKI are examined. The key factors will then be transferred into a diffusion model consisting of the primary PKI services, the secondary technologies, the process level, the user populations and the markets. Different qualities of a PKI will be distinguished. The qualified electronic signature, according to the German Electronic Signature Act (SigG), is also taken into account. With the results of a Delphi study by 69 experts, the PKI diffusion model will be filled and calibrated with real data. The study’s board of participants consists of users, suppliers and scientists in the field of PKI. All participants are designated experts in their field and worked through the Delphi questionnaire twice, thereby judging, commenting and replenishing the study.


Business Process Service Orient Architecture Electronic Signature Delphi Study Trust Platform Module 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [Bass69]
    Bass, F.M.: A New product Growth Model for Consumer Durables, Management Science, Vol. 15, 1996, p. 215–227.CrossRefGoogle Scholar
  2. [Dill178]
    Dillmann, D.: Mail and telephone surveys. The total design method, Wiley, 1978Google Scholar
  3. [Häde02]
    Häder, M.: Delphi-Befragungen — Ein Arbeitsbuch. Westdeutscher Verlag, 2002.Google Scholar
  4. [Heus04]
    Heusch, C.-A.: Die elektronische Signatur — Änderung des Bürgerlichen Rechts aufgrund der Signatur-Richtlinie (1999;93;EG) durch das Gesetz zur Anpassung der Formvorschriften des Privatrechts an den modernen Rechtsgeschäftsverkehr vom 13. Juli 2001, Tenea Verlag, 2004.Google Scholar
  5. [KaLP05]
    Katsikas, S.K.; Lopez, J.; Pernul, G.: Security, Trust and Privacy in Digital Business. In: International Journal of Computer Systems, Science & Engineering 10 (2005) 6, CRL Publishing, 2005.Google Scholar
  6. [LMM+06]
    Lioy, A.; Marian, M.; Moltchanova, N.; Pala, M.: PKI past, present and future, in: International Journal of Information Security, Springer, Vol.5, Nr. 1, 2006, S. 18–29.Google Scholar
  7. [LoOP05]
    Lopez, J.; Oppliger, R.; Pernul, G.: Classifying Public Key Certificates, in: Chadwick, D.; Gänsen Z. (Eds.): Public Key Infrastructure, Springer, 2005, p. 135–143.Google Scholar
  8. [MaPe85]
    Mahajan, V; Peterson, R. A.: Models for Innovation Diffusion, Sage Publications Inc., 1985.Google Scholar
  9. [PeOL05]
    Pernul, G.; Opplinger, R.; Lopez, J.: Why have Public Key Infrastructures failed so far? In: Internet Research, 15 (2005) 5, p. 544–556.CrossRefGoogle Scholar
  10. [PuSr00]
    Putsis, W P.; Srinivasan, V: Estimation techniques for macro diffusion models, in: Vijay M.; Muller, E; Wind Y. (Hrsg.): New Product Diffusion Models, Springer, 2000, p. 263–291.Google Scholar
  11. [Roge95]
    Rogers, E.M.: Diffusion of Innovations, 4. Edition, The Free Press, 1995.Google Scholar
  12. [Whea06]
    Wheatmann, Vic et al.: Hype Cycle for Information Security 2006, from: Gartner Inc., 2006.Google Scholar

Copyright information

© Friedr. Vieweg & Sohn Verlag | GWV Fachverlage GmbH, Wiesbaden 2007

Authors and Affiliations

  • Michael Gaude
    • 1
  1. 1.Vehicle Change ManagementSindelfingenGermany

Personalised recommendations