Skip to main content
DSI Publications
Subject(s)
Economics, politics and business environment; Information technology and systems; Technology, R&D management
Keyword(s)
IT-Security, Digital Sovereignty, Industrial policy
The public hearing of the Digital Agenda Committee on the topic of "IT security of hardware and software as a precondition for digital sovereignty" on Wednesday, December 11, 2019, analyzed how citizens, companies, but also public administration organizations in Germany are positioned with regard to digital sovereignty . The Committee led by Hansjörg Durz (CDU/CSU) focused primarily on the current state of Germany's IT infrastructure and governance, the need for legislative action, and security gaps.
In her statement, Isabel Skierka gives an assessment of Germany's industrial policy position in the field of digital technologies and the IT security situation and recommendations for strengthening digital sovereignty and IT security at the national and European level.

[Wie die Bürger, Unternehmen, aber auch die Verwaltung in Deutschland hinsichtlich der digitalen Souveränität aufgestellt sind, dazu gaben die Sachverständigen bei einer öffentlichen Anhörung des Ausschusses Digitale Agenda zum Thema „IT-Sicherheit von Hard- und Software als Voraussetzung für Digitale Souveränität“ am Mittwoch, 11. Dezember 2019, unterschiedliche Einschätzungen ab. Bei der Expertenbefragung unter Leitung von Hansjörg Durz (CDU/CSU) ging es vor allem um den Ist-Zustand der IT-Struktur Deutschlands, gesetzgeberischen Handlungsbedarf und Sicherheitslücken.
In ihrer Stellungnahme gibt Isabel Skierka eine Einsch¨ätzung zur industriepolitischen Stellung Deutschlands im Bereich digitaler Technologien sowie der IT-Sicherheitslage und Empfehlungen für die Stärkung digitaler Souveränität und der IT-Sicherheit auf nationaler und europäischer Ebene.]
Journal Article
Antitrust Chronicle 3 (2): 33–38
Martin Schallbruch, Heike Schweizer, Achim Wambach (2019)
Subject(s)
Information technology and systems; Technology, R&D management
Keyword(s)
Competition law, antitrust law, digital platforms, data access
The Commission “‘Competition Law 4.0’” was set up by the German Federal Minister for Economic Affairs and Energy with the task to draw up recommendations for the further development of EU competition law in the light of the digital economy. The final report with 22 recommendations was handed over in September 2019.
The commission finds that the practical and actual power of consumers to dispose of their own data must be improved, clear rules of conduct for dominant platforms must be introduced, legal certainty for cooperation in the digital sector must be enhanced, and the institutional linkage between competition law and other digital regulation must be strengthened.
Volume
3
Journal Pages
33–38
Report
Report by the Commission ‘Competition Law 4.0’
Martin Schallbruch, Heike Schweizer, Achim Wambach (2019)
Subject(s)
Information technology and systems; Technology, R&D management
Keyword(s)
Competition law, antitrust law, digital platforms, data access
The Commission “‘Competition Law 4.0’” was set up by the German Federal Minister for Economic Affairs and Energy with the task to draw up recommendations for the further development of EU competition law in the light of the digital economy. The final report with 22 recommendations was handed over in September 2019.
The commission finds that the practical and actual power of consumers to dispose of their own data must be improved, clear rules of conduct for dominant platforms must be introduced, legal certainty for cooperation in the digital sector must be enhanced, and the institutional linkage between competition law and other digital regulation must be strengthened.
Pages
88
Subject(s)
Information technology and systems; Technology, R&D management
Keyword(s)
open science, open educational resources, law, copyright law, data protection, privacy
The book provides an overview of legal questions in regard to open science, with a particular focus on issues of copyright and data protection.
Pages
156
ISBN
978-3-943423-66-2
ISBN (Online)
978-3-943423-67-9
Conference Proceeding
In Secure IT systems, 1st ed., 11252 vols. 236–254. Olso, Norway: Springer International Publishing.
23rd Nordic Conference, NordSec 2018, Oslo, Norway, Proceedings
2018 Best Paper Award
Subject(s)
Information technology and systems
Keyword(s)
Moving target defense, attack simulation, attack graphs, network modeling
Secondary Title
Secure IT systems
Edition
1st ed.,
Journal Pages
236–254
Book
SpringerBriefs in Cybersecurity, 1st ed.,New York City, New York: Springer
Subject(s)
Economics, politics and business environment; Information technology and systems
Keyword(s)
Cybersecurity, cyber defense, critical infrastructure protection, digital sovereignty, data protection, policy, strategy, regulation
JEL Code(s)
K24, N44, O25, O38
With the digitization of nearly all aspects of life, our societies increasingly depend on the resilience and security of computing and communication technologies. Hence, the protection of information technology (IT) against unauthorized access, attack, and accidental failure, has become a priority for nation-states around the world. Throughout the past one or two decades, most countries have adopted strategies, policies, and practical steps to protect the security of IT and critical infrastructures within their territory, and, by extension, their citizens. These practices are generally subsumed under the umbrella of cybersecurity. The book provides an analysis of the evolution of cybersecurity policy in Germany over the past two and a half decades. It highlights development lines as well as upcoming strategic challenges of the German cybersecurity policy.
Volume
1st ed.,
Pages
76
ISBN
978-3-319-90013-1
ISBN (Online)
978-3-319-90014-8
Conference Proceeding
IET Conference & Seminar Publications CP740
Subject(s)
Health and environment; Information technology and systems
Keyword(s)
Medical devices, e-health, IoT, governance, cybersecurity, safety
Subject(s)
Economics, politics and business environment; Ethics and social responsibility; Information technology and systems; Technology, R&D management
Keyword(s)
Digital strategy, digitalization, cybersecurity, digital law, digital government
JEL Code(s)
H11, H40, H77, O38
Pages
271
ISBN
978-3-658-19946-3
ISBN (Online)
978-3-658-19947-0
Conference Proceeding
Subject(s)
Information technology and systems
Keyword(s)
Cybersecurity, cyberstrategy, vulnerability equities process
Journal Article
IEEE Transactions on Dependable and Secure Computing PP (99): 1–14
Subject(s)
Information technology and systems
Keyword(s)
Robust fuzzy extractor, physical unclonable functions (PUFs), helper data manipulation attacks
Volume
PP
Journal Pages
1–14
ISSN (Print)
1545-5971