Advertisement

An Empirical Study of the Technology Transfer Potential of EU Security and Trust R&D Projects

Conference paper
  • 764 Downloads
Part of the Communications in Computer and Information Science book series (CCIS, volume 470)

Abstract

European R&D Projects are characterised by a significant presence of industry and by heavy reports of exploitation plans. An intriguing question is therefore whether such projects actually delivered the technology transfer their funder is longing for. This report presents a comprehensive study on the innovation potential of FP7 projects funded by the ICT Call 1 for Trustworthy ICT and the Joint ICT and Security Call and is based on documental evidence and ethnographic research.

The analysis of the participants landscape reveals a connected community where few general software producers and integrators act as hubs between different interests groups (such as privacy and critical infrastructure protection) while specialised IT security companies play a minor role. In terms of innovation potential some projects have produced research results that are directly usable by citizens, but most projects have delivered tools and methods for ICT specialists. Most architectural results delivered look pretty hard to market. However, some projects have delivered results that are actually exploited. Such “success stories” exemplify tangible innovation outcomes from Trust and Security Programme.

Keywords

FP7 framework Trust and security programme R&D projects 

Notes

Acknowledgements

We would like to thank the Head, the current and past Project Officers of the F5 Unit and the project and technical coordinators of the FP7 Security and Trust Projects for providing us the necessary bootstrapping information. Without their guide and their support this report would not have been feasible.

At the University of Trento F. Dalpiaz, G. Oligeri, and F. Paci contributed to the analysis of project deliverables. From the EFFECTS+ and SECCORD consortia the suggestions from M. Bezzi, F. Clearly, N. Papanikolaou and N. Wainwright were extremely helpful.

The work leading to this report was supported by the EU under the FP7 ICT EFFECTS+ and SECCORD projects. This paper presents only the authors’ point of view, and does not reflect the opinion of the EC.

References

  1. 1.
    Effects+ Project: D2.2 The Innovation Potential of FP7 Security & Trust Projects (2013)Google Scholar
  2. 2.
    Ernst & Young: Into the cloud, out of the fog. global information security survey (2011)Google Scholar
  3. 3.
    Lerner, E.: Biometric identification. Ind. Physicist 6(1), 20–23 (2000)Google Scholar
  4. 4.
    Rasmussen, M., McClean, C.: Trends in governance, risk and compliance. forrester research (2007). http://mthink.com/sites/default/files/legacy/cfoproject/content/pdf/cfo3_3_86_wp_forrester_rasmussen.pdf
  5. 5.
    Frost & Sullivan: Demand for geographically dispersed scada in oil and gas sector poised to drive growth in world scada market (2010). http://www.frost.com/prod/servlet/press-release.pag?docid=218949720

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.University of TrentoTrentoItaly

Personalised recommendations