Skip to main content
Publications
DSI Industrial & Policy Recommendations Series (IPR)
DSI Industrial & Policy Recommendations Series (IPR)
Subject(s)
Economics, politics and business environment; Information technology and systems; Technology, R&D management
Keyword(s)
Blockchain, distributed ledger, strategy, policy, innovation
In its 2018 coalition agreement, the German federal government has set itself the goal of adopting a "Blockchain strategy" in this legislative period. As part of the planned promotion of Distributed Ledger and Blockchain technologies, the government wants to create a framework for the development and application of these technologies and test them in public administration. The Federal Ministry of Economics and Energy and the Federal Ministry of Finance are jointly in charge of developing the strategy. On this occasion, in a workshop on 3 July 2018 at the Digital Society Institute of ESMT Berlin, 35 experts from politics, business and science discussed how a national blockchain strategy can be practically organized. The discussion focused on the questions of what goals such a strategy should have, what the central enablers and appropriate framework conditions for the development and application of Distributed Ledger technologies such as blockchain can be in Germany, and what role the state plays in promoting the technology and managing risks in this technology field. Sarah Basic and André Eid (Federal Ministry for Economic Affairs and Energy), Dr. Christian Hampel (Ernst & Young GmbH), Dr. Jürgen Kohr (Fujitsu), Dr. Manfred Lochter (Federal Office for Security in Information Technology) and Kai Wagner (Jolocom) gave input speeches to the debate. Based on the workshop discussion, this paper outlines requirements for a national blockchain strategy. [Die Bundesregierung hat sich in ihrem Koalitionsvertrag das Ziel gesetzt, in dieser Legislaturperiode eine „Blockchain-Strategie“ zu verabschieden. Im Rahmen der geplanten Förderung von Distributed Ledger und Blockchain Technologien sollen die Rahmenbedingungen für Entwicklung und Einsatz der Technologien verbessert und diese auch in der öffentlichen Verwaltung erprobt werden. Mit der Erarbeitung der Strategie sind federführend das Bundesministerium für Wirtschaft und Energie (BMWi) und das Bundesministerium der Finanzen (BMF) betraut. Aus diesem Anlass erörterten in einem Workshop am 3. Juli 2018 am Digital Society Institute der ESMT Berlin 35 Experten aus Politik, Wirtschaft und Wissenschaft, wie eine nationale Blockchain-Strategie praktisch organisiert sein kann. Im Zentrum der Diskussion standen die Fragen, welche Ziele eine solche Strategie haben sollte, was zentrale Ermöglicher und geeignete Rahmenbedingungen für die Entwicklung und Anwendung von Distributed Ledger Technologien wie Blockchain in Deutschland sein können, und welche Rolle dem Staat bei der Förderung und Bekämpfung von Risiken in diesem Technologiefeld zukommt. Impulsvorträge für die Diskussion hielten Sarah Basic und André Eid (Bundesministerium für Wirtschaft und Energie), Dr. Christian Hampel (Ernst & Young GmbH), Dr. Jürgen Kohr (Fujitsu), Dr. Manfred Lochter (Bundesamt für Sicherheit in der Informationstechnik) und Kai Wagner (Jolocom). Auf der Grundlage der Workshop-Diskussion skizziert dieses Papier Anforderungen an eine nationale Blockchain-Strategie.]
Pages
14
Book
SpringerBriefs in Cybersecurity, 1st ed.,New York City, New York: Springer
Subject(s)
Economics, politics and business environment; Information technology and systems
Keyword(s)
Cybersecurity, cyber defense, critical infrastructure protection, digital sovereignty, data protection, policy, strategy, regulation
JEL Code(s)
K24, N44, O25, O38
With the digitization of nearly all aspects of life, our societies increasingly depend on the resilience and security of computing and communication technologies. Hence, the protection of information technology (IT) against unauthorized access, attack, and accidental failure, has become a priority for nation-states around the world. Throughout the past one or two decades, most countries have adopted strategies, policies, and practical steps to protect the security of IT and critical infrastructures within their territory, and, by extension, their citizens. These practices are generally subsumed under the umbrella of cybersecurity. The book provides an analysis of the evolution of cybersecurity policy in Germany over the past two and a half decades. It highlights development lines as well as upcoming strategic challenges of the German cybersecurity policy.
Volume
1st ed.,
Pages
76
ISBN
978-3-319-90013-1
ISBN (Online)
978-3-319-90014-8
Conference Proceeding
IET Conference & Seminar Publications CP740
Subject(s)
Health and environment; Information technology and systems
Keyword(s)
Medical devices, e-health, IoT, governance, cybersecurity, safety
DSI Industrial & Policy Recommendations Series (IPR)
DSI Industrial & Policy Recommendations Series (IPR) 2018 (1)
Subject(s)
Economics, politics and business environment; Information technology and systems; Technology, R&D management
Keyword(s)
IT security, cybersecurity
The report gives an overview on the current situation on cybersecurity and the political handling of that topic. It also recaps the goals and failures of the last four years and recommends action areas.
Volume
2018
DSI Industrial & Policy Recommendations Series (IPR)
DSI Industrial & Policy Recommendations Series (IPR) 2017 (6)
Subject(s)
Health and environment; Information technology and systems; Technology, R&D management
Keyword(s)
IT security, cybersecurity, e-health, IoT, safety, medical devices
The healthcare industry is undergoing great technological transformations. Hospitals are going digital and medical devices – whether implanted in patients’ bodies or stationed in hospitals – are equipped with increasing computing power and wireless connectivity. Connected healthcare can offer safer, more efficient, and timely medical service delivery. It also presents great economic opportunities – according to a Roland Berger consultancy firm study, the digital healthcare market is set to grow at average annual growth rates of 21 percent until 2020. Yet, the integration of computing and communication technologies in safety-critical medical systems will expose them to the same network and information security (cyber security) threats as other information technology (IT) systems. Research and real-world incidents have shown that IT security risks in healthcare are systemic. Cyber attacks’ impact on the privacy of patient data has already been established. More recently, their potential impact on patient health and safety has been raising concerns for healthcare organizations, regulators, and medical device manufacturers alike. The management and governance of related risks requires comprehensive standardization, regulation, and best practices to encompass both IT security and safety. DSI has analyzed the convergence of safety and security risks in healthcare and the Internet of Things through a review of the relevant literature, as well as expert interviews and a workshop with representatives from health organizations, medical device manufacturers, IT security experts, safety engineers, regulators, and certification bodies. On this basis, DSI has developed recommendations for policy and industry, which are presented by this paper after a short analysis of the current status of security in connected healthcare.
Volume
2017
Report
In Digitalpolitik: Eine Einführung, edited by Lorena Jaume-Palasí, Julia Pohle, Matthias Spielkamp, 19–26. Berlin: Wikimedia.
Subject(s)
Information technology and systems
Keyword(s)
Cybersecurity, National Security, Human Rights, Conflicts
Secondary Title
Digitalpolitik: Eine Einführung
Journal Pages
19–26
Conference Magazine
CyFy Journal Digital Debates 2016 3 (2016)
Subject(s)
Information technology and systems
Keyword(s)
Cyber command, cyber war, espionage, Germany, sabotage, Ursula von der Leyen
Volume
3
Book Review

Krieg der Knöpfe [War of the buttons]

Internationale Politik
Subject(s)
Economics, politics and business environment
Keyword(s)
cyber security, electronic warfare
Review of: @War – The Rise of the Military-Internet Complex by Shane Harris, Digitale Diktatur. Totalüberwachung, Datenmissbrauch, Cyberkrieg by Stefan Aust and Thomas Ammann.
Journal Pages
134–138
Report
New America Foundation and Global Public Policy Institute
Robert Morgus, Isabel Skierka, Mirko Hohmann, Tim Maurer (2015)
Subject(s)
Information technology and systems
Keyword(s)
Cyber security, incident response, critical infrastructures
Book Chapter
In Handwörterbuch Internationale Politik, 13th ed., edited by Wichard Woyke, Johannes Varwick, 45–49. Leverkusen: Verlag Barbara Budrich.
Isabel Skierka, Thorsten Benner (2015)
Subject(s)
Economics, politics and business environment
Keyword(s)
Digital sovereignty, industrial policy, digitalization, cyber security
Secondary Title
Handwörterbuch Internationale Politik
Edition
13th ed.,
Journal Pages
45–49
ISBN
978-3825245184
Report
New America Foundation and Global Public Policy Institute
Isabel Skierka, Robert Morgus, Mirko Hohmann, Tim Maurer (2015)
Keyword(s)
Cyber security, incident response, critical infrastructures
Book Review

Amerika abwickeln [Unwinding America]

Internationale Politik
Subject(s)
Economics, politics and business environment
Keyword(s)
American decline, US politics
Review of: The Unwinding: An Inner History of the New America by George Packer, The Myth of America’s Decline - Economics, and a Half Century of False Prophecies by Josef Joffe, and Amerikas Kriege by Alexander Emmerich and Philipp Gassert.
Journal Pages
138–141
Book Review

Die Illusion vom „sauberen Krieg“ [The illusion of "clean" war]

Internationale Politik
Subject(s)
Economics, politics and business environment
Keyword(s)
electronic warfare, revolution in military affairs, cyber security
Review of: Confront and Conceal. Obama’s Secret Wars and Surprising Use of American Power by David E. Sanger, Dirty Wars: The World Is A Battlefield by Jeremy Scahill, and The Way of the Knife: The CIA, a Secret Army, and a War at the Ends of the Earth by Mark Mazzetti.
Journal Pages
134–137