Skip to main content

An Empirical Study of the Technology Transfer Potential of EU Security and Trust R&D Projects

  • Conference paper
  • First Online:
Cyber Security and Privacy (CSP 2014)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 470))

Included in the following conference series:

Abstract

European R&D Projects are characterised by a significant presence of industry and by heavy reports of exploitation plans. An intriguing question is therefore whether such projects actually delivered the technology transfer their funder is longing for. This report presents a comprehensive study on the innovation potential of FP7 projects funded by the ICT Call 1 for Trustworthy ICT and the Joint ICT and Security Call and is based on documental evidence and ethnographic research.

The analysis of the participants landscape reveals a connected community where few general software producers and integrators act as hubs between different interests groups (such as privacy and critical infrastructure protection) while specialised IT security companies play a minor role. In terms of innovation potential some projects have produced research results that are directly usable by citizens, but most projects have delivered tools and methods for ICT specialists. Most architectural results delivered look pretty hard to market. However, some projects have delivered results that are actually exploited. Such “success stories” exemplify tangible innovation outcomes from Trust and Security Programme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Several banks around the world, e.g., Bank United (Houston, TX) and Nationwide Building Society (UK), have tested iris scanners as an alternative to personal identification number (PIN) codes for ATM access [3]

  2. 2.

    Less known examples are the 2000 insider attack on the Australian water system that caused the spillage of 800,000 liters of sewage into rivers and parks in Queensland; the “Slammer worm” infecting the Davis Besse nuclear power plant in Ohio, causing a five-hour shutdown of computer systems in August 2003; and the Hatch nuke plant in Georgia shutting down for two days after an engineer loaded a software update for a business network that also rebooted the plant’s power control system in June 2008.

References

  1. Effects+ Project: D2.2 The Innovation Potential of FP7 Security & Trust Projects (2013)

    Google Scholar 

  2. Ernst & Young: Into the cloud, out of the fog. global information security survey (2011)

    Google Scholar 

  3. Lerner, E.: Biometric identification. Ind. Physicist 6(1), 20–23 (2000)

    Google Scholar 

  4. Rasmussen, M., McClean, C.: Trends in governance, risk and compliance. forrester research (2007). http://mthink.com/sites/default/files/legacy/cfoproject/content/pdf/cfo3_3_86_wp_forrester_rasmussen.pdf

  5. Frost & Sullivan: Demand for geographically dispersed scada in oil and gas sector poised to drive growth in world scada market (2010). http://www.frost.com/prod/servlet/press-release.pag?docid=218949720

Download references

Acknowledgements

We would like to thank the Head, the current and past Project Officers of the F5 Unit and the project and technical coordinators of the FP7 Security and Trust Projects for providing us the necessary bootstrapping information. Without their guide and their support this report would not have been feasible.

At the University of Trento F. Dalpiaz, G. Oligeri, and F. Paci contributed to the analysis of project deliverables. From the EFFECTS+ and SECCORD consortia the suggestions from M. Bezzi, F. Clearly, N. Papanikolaou and N. Wainwright were extremely helpful.

The work leading to this report was supported by the EU under the FP7 ICT EFFECTS+ and SECCORD projects. This paper presents only the authors’ point of view, and does not reflect the opinion of the EC.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Martina de Gramatica or Fabio Massacci .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

de Gramatica, M., Massacci, F., Gadyatskaya, O. (2014). An Empirical Study of the Technology Transfer Potential of EU Security and Trust R&D Projects. In: Cleary, F., Felici, M. (eds) Cyber Security and Privacy. CSP 2014. Communications in Computer and Information Science, vol 470. Springer, Cham. https://doi.org/10.1007/978-3-319-12574-9_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12574-9_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12573-2

  • Online ISBN: 978-3-319-12574-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics