Advertisement

IT-Security Beyond Borders — an Assessment of Trust Levels Across Europe

  • Christian Wernberg-Tougaard

Abstract

The world is changing — faster and faster. Every now and then we realize that if we had planned, if we had envisioned the transformation of the society’s use of technology, we would have been much more prepared for fighting IT-security threats and challenges.

At the same time several indicators point at disrust to digital service among both citizens and companies. The studies cited in the paper indicate that society needs to raise the awareness — not only of IT-security — but of the culture associated with being citizens and companies in the digitized service society — otherwise we might risk a new generation of people who suffer from techno-fear.

This paper discusses two subjects: (1) the outcome of an expert group appointed by the Danish Board of Technology on behalf of the Danish Parliament to examine future IT-security threats and challenges that needed international action to prevent damage to Denmark. This section will inherently be biased toward telling the Danish case, although its applicability is far wider internationally. The outcome has been presented to a parliamentary committee which together with Government will focus on the long term pan-European actions that need to be done/coordinated in order to avoid damaging IT-security threats in the future. (2) the current level of trust as evidenced by the “wheel of distrust” (the mechanism creating greater and greater uncertainty and disbelief of the digital services — something that will be pivotal to overcome for the growth of countries) and research.

The paper concludes with recommendations for the joint actions that the European Commission (EC) and the Member States need to take in order to preserve the advanced digital community that we are on the edge of realizing.

Keywords

Public Procurement Knowledge Society Trust Level Security Breach European Citizen 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [Post75]
    Postel, Johnatan: “RFC 706 — On the junk mail problem”. Network Working Group, Request for Comments: 706, NIC #33861, Nov 1975. http://www.faqs.org/rfcs/rfc706.htmlGoogle Scholar
  2. [DBT07]
    The Danish Board of Technology: “IT-security beyond borders” — the findings and recommendation to the Danish Parliament and the Ministry of Science by an independent expert group, 2007. http://www. tekno.dk/subpage.php3?article=1288&toppic=kategorill&language=uk&category=11Google Scholar
  3. [Unis06]
    Unisys: Global Study on the Public’s Perceptions about Identity Management, May 2006. http://www. Unisys.com/eprise/main/admin/corporate/doc/ID_Research_w_paper.pdfGoogle Scholar

Copyright information

© Friedr. Vieweg & Sohn Verlag | GWV Fachverlage GmbH, Wiesbaden 2007

Authors and Affiliations

  • Christian Wernberg-Tougaard
    • 1
  1. 1.Innovation and TransformationUnisys EMEAVærløse

Personalised recommendations