DSI Publications
Subject(s)
Information technology and systems; Technology, R&D management
Keyword(s)
Digital strategy, government reform, digital law, digital infrastrucure
Digital innovation can be extremely beneficial to citizens. However, current digital strategies of governments are not strong enough to ensure that digital innovation is not a threat to society – but, only a benefit. Digital innovation will only be effective if governments adopt strong digital strategies. Key issues are a less-specific digital regulation, a greater government’s investment in digital infrastructures, a higher flexibility for local governments, and a strengthening of digital policy leadership within governments.
Keyword(s)
international human rights, right to vote, voter fraud, disinformation, authoritarianism
Subject(s)
Information technology and systems; Technology, R&D management
Keyword(s)
China, privacy, cybersecurity, transatlantic relationship
China, Europe, and the United States are competing over whose image will be most reflected in rules and normst hat define digital markets. Regulatory measures such as Europe’s GDPR and China’s Cybersecurity Law combine privacy, security, and safety regulation. Driving factors are security policy as well as industry and trade policy. With China pulling into the pole position in the digital technology race, it is time for the United States and Europe to forge a digital governance alliance
Subject(s)
Information technology and systems
Keyword(s)
Hardware reverse engineering, malicious design modifications, embedded systems security
The threat of inserting hardware Trojans during the design, production, or in-field poses a danger for integrated circuits in real-world applications. A particular critical case of hardware Trojans is the malicious manipulation of third-party FPGA configurations. In addition to attack vectors during the design process, FPGAs can be infiltrated in a non-invasive manner after shipment through alterations of the bitstream. First, we present an improved methodology for bitstream file format reversing. Second, we introduce a novel idea for Trojan insertion.
Journal Pages
112–119
Subject(s)
Information technology and systems
Keyword(s)
Moving target defense, attack simulation, attack graphs, network
modeling
Secondary Title
Secure IT systems
Edition
1st ed.,
Pages
236–254
Subject(s)
Information technology and systems; Technology, R&D management
Keyword(s)
Cybersecurity, information security
Book review of Paul Voigt, “IT-Sicherheitsrecht”, (IT security law), 2018
Secondary Title
Buchbesprechungen. Paul Voigt, IT-Sicherheitsrecht
Journal Pages
r81–r81
Subject(s)
Health and environment; Information technology and systems
Keyword(s)
Medical devices, e-health, IoT, governance, cybersecurity, safety
Subject(s)
Technology, R&D management
Keyword(s)
Physical Unclonable Function (PUF), ring oscillator PUF, TERO PUF, loop PUF, Field Programmable Gate Array (FPGA)
Subject(s)
Technology, R&D management
Keyword(s)
cyber attacks, Internet, crime