as well as averting the risks of misuses that inevitably accompany any step of human evolution. I am thankful to the authors for this startling journey into a nascent field
as well as in fields ranging from the military to espionage. But there has been much less systematic support for innovations that use digital technology to address social challenges.
not surprisingly, would prefer digital social innovation to remain the domain of geeks, hackers and activists.
'There is great potential to exploit digital network effects, in social innovation activity and new services that generate social value,
is convenient for users but also locks users in at the expense of security, privacy and openness:
A main Internet trend-threat is recognised today: an increasing concentration of power in services in the hands of a few data aggregators, none of which are based in Europe (Google controlling nearly 82%of the global search market and 98%of the mobile search market,
For example, even the European Smart Cities project risks being dominated by US companies such as IBM, Google and Ciscos, partly because of the lack of alternatives.
This vision requires more investment in fundamental research to promote net-neutrality, strong encryption, banning of trivial patents, open standards and free software together with the multi-stakeholder governance model.
A major risk for the Future Internet is the realisation of theBig brother'scenario, with big industrial players (mainly US-based) reinforcing their dominant position by implementing platform lock in strategies,
and by striking strategic alliances between the largest Over-The-Top (OTT) iand largest network operators, there is a risk that the innovation ecosystem will become more closed,
Even more worrying, the latest NSA data-gate showed that intelligence agencies and governments have been engaging in mass surveillance operations,
with huge implication on civil liberties and privacy. 20 Growing a Digital Social Innovation Ecosystem for Europe 1 7 5 3 2 2+Growing a Digital Social
Research project, Advocating and campaigning, Maker and hacker spaces, Investing and Funding, Event, Incubators and Accelerators, Advisory or expert body, Education And Training. 3 Technology Trends:
from grassroots movements, think-tanks and universities to big charities and public museums are hosting small-scale workshop spaces often with digital tools and 3d printing facilities (maker spaces and hacker spaces.
There are now 96 known active hacker spaces worldwide, with 29 in the United states, according to Hackerspaces. org.
There are many more Hacklabs around the world that are branded not as hacker spaces, but are community labs that incentivise the diffusion of free and p2p culture and open technology.
and since then makerspaces have expanded from the electronics-centric hacker spaces to having a stronger emphasis on groups that attract a diversity of professionals such as artists, machinists, robotics engineers, bicycle makers, jewellery makers, photographers and fashion designers.
and hackers) to design and deliver public services that meet our societies'changing needs. Your Priorities platform in Reykjavik is offering a successful model experimenting with citizens in Iceland, integrating large-scale deliberation into democratic decisionmaking.
or to mobilise collective action and respond to community emergencies. Some of the best examples of DSI in Europe are clearly positively impacting society.
and respond to community emergencies, as in the case of Crisiscommons, Crisisnet and Ushahidi. Crisisnet CRISIS MAPPING Crisisnet is developed an initiative by Ushahidi10,
like Observe Hack Make, a five day outdoor international camping festival for hackers and makers,
and the Chaos Communication Camp, an international meeting of hackers that takes place every four years,
organised by the Chaos Computer Club (CCC) 11, an informal association of hackers from across Europe.
The Chaos Computer Club (CCC), Europe's largest network of hackers, is the most prominent example of grassroots communities coming together to develop
and provide information about technical and societal issues, such as surveillance, privacy, freedom of information, hacktivism and data security.
Supporting the principles of the hacker ethic, the club also fights for free access to computers and technological infrastructure for everybody.
The Chaos Computer Club (CCC) HACKERS NETWORKS 34 Growing a Digital Social Innovation Ecosystem for Europe The World wide web Consortium (W3c), an international community that works on developing
and more generally the hacking culture of sharing skills and knowledge. 46 Growing a Digital Social Innovation Ecosystem for Europe Arduino OPEN HARDWARE OPEN HARDWARE new ways of making
This can also mean increased surveillance prediction and control of people and the environment. However, as outlined by Rob Van Kranenburg,
AND ACCELERATORS MAKER AND HACKER SPACES ADVISORY OR EXPERT BODY INVESTMENT AND FUNDING 152 26 13 74 76 70 30 30 31 32 0 Project
enhancing cybe-security and mainstreaming digitalisation. The Digital Agenda for Europe20 Innovation Union21, and Horizon 202022 present an integrated approach to help the EU economy become more competitive,
and encryption Federated identity management Data control and data ownership The EU data protection reform package Directive on the reuse of public sector information Copyright reform Net Neutrality Magna carta for the Internet Enabling
and harmonise these areas whih, have so far been isolated left to developers, activists and hackers.
as given in both legal frameworks (such as data protection) and technologies (such as encryption) should apply to individual citizens.
In particular, more support is needed for encryption and anonymity technologies, such as attribute-based credentials built by ABC4TRUST63.
76 Growing a Digital Social Innovation Ecosystem for Europe DATA CONTROL AND DATA OWNERSHIP PRIVACY-AWARE TECHNOLOGIES AND ENCRYPTION An important effort towards a federated identity system
and analysed with the main objective of maximising value extraction (e g. for marketing, economic competition and surveillance).
to keep the Internet open, without surveillance and censorship, and to halt power abuses from Governments and corporations.
However, noninstitutional actors (hackers, geeks, social innovators and activists) are key in this process since they are able to generate creativity,
and offer more incentives for risk taking. Entrepreneurial knowledge involves much more than science and technology.
a regional development strategy may risk increasing vulnerability to changing economic conditions. Therefore it is crucial that the second principle of'relatedness'is taken also into consideration.
New materials, Production and automation technology, Cleantech, and Security. These fields present the regional strength in regional publicly funded R&d and industrial activity.
run the risk of autarky, and take a narrow view on the role of policy in the exercise.
stimulation of entrepreneurship/management of risk and uncertainty; market formation; mobilisation of resources; and legitimation.
the design of the RIS3 architecture needs to anticipate the risk of capture and make it more difficult for traditional groups to frustrate the process.
and risks associated with entrepreneurial search are shared and therefore do not become too prohibitive for the firm that is leading the search process.
Prioritisation always entails risks for those who have to select those few domains that, as a result, will get privileged access to public funding.
Such an open, participatory process, together with reliance on robust evidence based on regional assets, are the best guarantees to avoid both the risk of capture by interest groups
and the risk of lock in into traditional activities. Once the priorities are adopted it is important that the strategy is validated
Strategies that stop before this step run the risk of remaining unimplemented and/or not credible.
OECD 2011 58 Developing a RIS3 involves a degree of risk-taking, since there is always some uncertainty in the choice of priorities,
Test new or unconventional policy support approaches on a small scale before possible extension, limiting risk.
uncovering specific risk factors, such as the existence of a number of industries in need of modernisation or the dependence of the regional economy on a limited number of industries.
This implies, for instance, verifying that the vulnerability and capacity of adaptation of the regional innovation system have been
services, online safety and security, intelligent energy networks and smart energy services. To best harness EU funding from these various financial instruments, one of the key challenges for management authorities is
, trust, security, etc; b) have a sectoral focus targeting ICT industrial and technological leadership in R&d&i fields such as Key Enabling Technologies (KETS),
Further exploit links between the CCIS and other important policy areas for cohesion and/or rural development policies, in particular urban and rural regeneration, territorial cooperation, cultural heritage and tourism;
EU level debt instruments (guarantees/risk sharing: CIP-SMEG, RSFF, LGTT Risk Sharing Finance Facility (RSFF.
The Risk-Sharing Finance Facility (RSFF) aims to improve access to debt financing for promoters of research
and innovation investments by sharing the underlying risks between the EU and the EIB. Together, the European commission and the EIB are 113 http://ec. europa. eu/enterprise/policies/finance/cip-financial-instruments/index en. htm 114 http://www. margueritefund. eu
/99 providing up to EUR 2 billion (up to EUR 1 billion each) to support loans or guarantees supporting the priorities of the Seventh Framework Programme for RTD (FP7).
the Risk-Sharing Instrument (RSI), was launched at the end of 2011. It was operated by the EIF on behalf of the EIB
The Loan Guarantee Instrument for TEN-T projects partially covers this revenue risk and consequently improves the financial viability of such TEN-T projects. 117 Policy DG in charge:
in order to reduce their risk and increase their lending activities in favour of the sector. It amounts to EUR 8 million over the period 2010-2013.
1) a guarantee instrument to providers of micro-credit (i e. loans of up to EUR 25,000, in particular to vulnerable groups in risk of social exclusion, for the purpose of setting up small commercial operations;
The European Investment Fund provides financial intermediaries an integrated risk finance product range of SME finance initiatives,
Procurers tend to favour low cost, low risk, and off-the-shelf solutions once the (political) decision on what to buy and at
There are hardly any mechanisms to allow the pooling of risk and resources across countries and different administrations;
and by decreasing the potential innovation costs and financial risks through ERDF co-funding; The recognition of the procurement phase as strategic in public policy cycles, by associating procurement departments at an early stage in the definition of a project and of regional innovation strategies for smart growth;
There is a risk of it being hampered by insufficient knowledge, limited support of grass roots, social enterprise and social entrepreneurship activities
In this regard, it has a pivotal role in answering (together with private stakeholders and the civil society) today's major societal challenges such as demographic ageing, increased demand for healthcare services, risk
risk management and strategic planning with a view to obtaining a better access to the private capital markets,
demographic change and wellbeing PHC-12-2014/20154 Clinical research for the validation of biomarkers and/or diagnostic medical devices 66.10 45.00 9. Food security, sustainable agriculture and forestry,
Secure societies Protecting freedom and security of Europe and its citizens DRS-17-2014/2015 Protection of urban soft targets and urban critical 7. 00 7
and services as well as access to the financial facilities supported under Access to Risk Finance of this work programme. 6 For topic PHC-12-2014/2015,
or manage the higher risks resulting from international opening of the schemes. Financial incentives, for example co-funding a limited number of initial transnational cooperation projects with knowledge institutions,
and control and manage risk in a collaborative partnership. This will provide managers of small companies with hands-on guidelines on how to innovate and setup innovation networks.
This action is linked to an investment readiness measure (Call H2020-BIR-2014 in the Access to Risk Finance Work Programme
Tackling societal challenges fact sheets 1. Health, demographic change and wellbeing 2. Food security, sustainable agriculture and forestry, marine, maritime and inland water research,
global warming, public health, security or water and food resources? Investing in quality and relevant research and technological development is the key to supporting resource efficiency
Food security, sustainable agriculture and forestry, marine and maritime and inland water research, and the Bioeconomy;
Secure societies protecting freedom and security of Europe and its citizens The Importance of Health Health is wealth,
the prediction and management of pandemic threats and will help to fight antimicrobial resistance. The return on this investment will include new ways to prevent disease, better diagnostics and more effective therapies,
and prevent disease throughout the lifespan by tackling key issues (nutrition, physical activity, alcohol, drugs and tobacco consumption, environmental risks, accidents at work, in traffic or at home, etc.).
Protecting citizens from health threats: combat pandemics or biological incidents and address the threat of bioterrorism and climate change.
Supporting dynamic health systems and new technologies: e-health, genomics and biotechnologies revolutionise healthcare and health systems, lower costs and contribute to their future sustainability support and the shift from hospital care to prevention and better citizen-centred care.
Food and feed security and safety, the competitiveness of the European agri-food industry and the sustainability of food production, supply and consumption including fisheries
http://www. facebook. com/innovation. union http://twitter. com/innovationunion 2. Food security, Sustainable Agriculture, Marine, Maritime and Inland Water Research,
and the Bioeconomy Fotolia. com Research and Innovation Managing food risk information in an online world Food scares can undermine consumer confidence,
putting our security, competitiveness and employment in jeopardy. It is essential then for the EU to spark a new industrial revolution that will deliver a low-energy economy
better mobility, less congestion, greater safety and security. Keeping transport competitive: the European transport industry as a global leader.
Water is fundamental to human health food security, sustainable development and the environment. It is also an economic sector of growing importance for Europe with a turnover of some 80 billion a year,
million people are at risk of poverty and 14 million young people are not in education,
The young generation in an innovative, inclusive and sustainable Europe (job insecurity, youth mobility, adult education, social political engagement of young people.
http://tinyurl. com/n5hflhm The Importance of Security Ensuring the security of its citizens is one of the primary obligations of any country.
Without safety and security as its basis, society cannot thrive. Governments keep citizens secure by fighting crime
and terrorism, protecting them against natural or man-made disasters, providing effective cybersecurity and protecting borders against illegal trafficking.
But while ensuring the security of citizens is an essential task of any administration, it is also a highly sensitive area that needs to incorporate respect for privacy
and the safeguarding of fundamental rights. The respect of privacy and individual freedom is thus at the heart of EU security research.
Competitive EU-based security industries can make a substantial contribution to the quality of life in European societies.
European companies are among the world leaders in most security sector segments thanks to their strong technological innovation.
The security industry is one of the sectors with the highest potential for growth and employment in the EU. In 2011, the security sector in the EU employed 180,000 people, with an annual turnover of some 30 billion.
What is EU Research and Innovation doing to support Security? In 2013, EU research on security focused on aftermath crisis management
and on logistics and supply chain security, addressing issues such as trafficking and contraband. Other research topics include fighting forest fires,
rescuing victims of disasters and the use of social media in crisis management. By the end of 2013, the EU will have financed over 250 security research projects, with more than 1, 500 participants, from 45 countries and with an SME participation rate of over 21%.
%Key policy actions to enhance the competitiveness of the EU security industry, to stimulate its growth
and to promote the creation of jobs include: Overcoming market fragmentation through the creation of EU-wide standards, the harmonisation of certification procedures for security technologies as well as better exploitation of synergies between security and defence technologies;
Reducing the gap from research to market by introducing new funding schemes such as Pre-Commercial Procurement;
Better integration of societal considerations by thoroughly assessing the impact of security technologies on fundamental rights,
and by setting in place procedures to test societal impact during the R&d phase. This societal challenge will continue to be supported under the future research and innovation programme Horizon 2020.
http://www. facebook. com/innovation. union http://twitter. com/innovationunion About EU-funded research into cyber security and online privacy The digital and online economy are central
or service for private use online because they were worried about security. The Commission is working to increase confidence in the online economy in particular through research into cyber security
and online privacy. 350 million were invested in this field over 2007-2013, through the Framework Programmes (currently FP7) and the Competitiveness and Innovation Programme ICT Policy Support Programme and at least 500 million are likely to be available under Horizon 2020.
This research addresses security, trust and privacy coherently from technological, economic, legal, social perspectives helping to promote innovation and economic growth in the EU,
The project is developing countermeasures that detect signs of liveness (e g. blinking, perspiration) and improve security of biometric systems.
TABULA RASA has transferred already five of these countermeasures to companies. Knowledge gained will help improve the design of future biometric sensors,
thus opening up the huge potential of biometric technology. Project coordinator: Idiap Research Institute (Switzerland) Country participants:
http://www. tabularasa-euproject. org Localising bombs in urban areas Terrorist acts committed using Home Made Explosives (HME) pose an increasing threat to our citizens.
Our capacity to deal with this threat is challenged by terrorists'ability to easily manufacture explosives from common components.
The overall objective of the LOTUS project is to develop a new anti-terrorism tool for law enforcement agencies,
in the form of an integrated surveillance system for continuous chemical background monitoring with fixed site
1991). 3. 3. Innovation barriers The most frequently indicated barriers constraining innovation are financial lack of funds for innovation, too high risk of innovation projects, too expensive technology.
The favoured conditions of the loans comprise low interest rates (3%p. a.)and the abstention from securities.
The actual composition varies, depending on risk, technological advance, and economic situation of the firm. This means that a newly established firm pursuing a high-risk and technologically ambitious innovation project will receive a higher percentage of the support in the form of grants.
In the past few years, guarantees have gained relative importance, the share of loans has decreased slightly, whereas the share of grants has remained rather constant.
, novelty, R&d risk, feasibility, functionality, technological upgrading) and economic (performance, marketing experience and perspectives, commercialization strategies) criteria with different weights.
lack of finance, too high risk consultancy, reduction of risk Technological effects: technical services, technical know-26.9 10.3 Technological problems:
and increasing the risk of collective failure at cluster level (Bathelt 2004: 155). This has consequences on cluster development,
The freeze of public funding in the second half of 2010 as well as the frequent changes in the structure of STI policy governance point however to some risks regarding the continuous policy commitment needed to further address these important challenges.
, 000 Kilometers Martinique & Guadeloupe Réunion Technological production Security Scientifi c production Source: Compiled by Science-Metrix using data from Scopus (Elsevier) Number of publications by NUTS2 regions of ERA countries Security, 2000-2011 Publications (Fractional Counting) 0. 0-26.3
26.3-71.3 71.3-148.1 148.1-296.8 296.8-565.0 Canary islands French guiana Azores Madeira 0 250 500 1, 000 1, 500 2
greenhouse gas emissions and a slight decrease in the share of population at risk of poverty (although with a negative evolution since the crisis started in 2008.
Share of population at risk of poverty or social exclusion(%:%32.1 31.4 29.4 28.2 29.6 29.9 31.0:-0. 6 24.2 23 23 (9) Country specific recommendation in R&i adopted by the Council in July 2012:
Share of population at risk of poverty or social exclusion(%:%32.1 31.4 29.4 28.2 29.6 29.9 31.0:-0. 6 24.2 23 23 (9) Source:
However, it also warns that businesses"still face a lack of interoperability, reliability and security,
Improving the competitiveness, safety and security of European shipping, Directorate-General for Energy and Transport, B-1049 Brussels:
and best practices Statistical data Simplification of transport chains Simplification of administrative compliance Single transport document Liability Security FREIGHT TRANSPORT LOGISTICS ACTION PLAN Framework for the ITS Regulatory Framework for the standardisation
ensure energy security; promote minimum labour standards for the sector; protect passengers and citizens; innovate in support of the above aims;
European competitiveness and prosperity would be at risk. 39 36 EEA Report No 1/2007:
and because of its impacts on oil supply security and environmental emissions, this sector has been a priority policy area within the EU for many years.
security and environment is illustrated by Värmlandstrafik AB case study, in Sweden (see Section 5. 12). The Public transport Authority (PTA) in Sweden was under pressure from the Government to better control the pollution generated by the public transport.
The end solution implemented by Värmlandstrafik AB has generated great benefits for the public transport (bus, train and tram) in terms of a better control of the operators'activities and the environmental impacts, in providing better security
Smart technologies should be introduced to avoid delays in the supply chain for security and other reasons.
RFID is expected to contribute to improved efficiency and security, and provide new quality services for mobility of people and goods. For instance,
and physical inventory counts streamline recall processes due to ability to identify possible impacts to damaged product improve security,
particularly in ICT strategy, security and new business solutions. 66 ICT training for employees Obtaining e-skills is not a one-off event the speed of technological change requires that skills need continually to be kept up-to date and relevant.
a digital signature or digital signature scheme is a type of asymmetric cryptography used to simulate the security properties of a signature in digital, rather than written, form. 89 Digital signatures use
Impostors, by minimising the risk of dealing with impostors or persons who attempt to escape responsibility by claiming to have been impersonated;
Message integrity, by minimising the risk of undetected message tampering and forgery, and of false claims that a message was altered after it was sent;
Revenge of the Nerds, IT DIRECTOR. 89 Wikipedia, http://en. wikipedia. org/wiki/Digital signature. 90 American Bar Association Section of Science and Technology Information security Committee E-business
and Open systems, by retaining a high degree of information security, even for information sent over open, insecure,
"as part of a question on the use of ICT security measures. In total, about 15%of firms (accounting for 21%of employment) reported that they had such rules.
In transport and logistics, RFID is expected to contribute to improved efficiency and security, and provide new quality services for mobility of people
eprocurement, counterfeiting, homeland security, and environment, the European commission has launched a wide-ranging public consultation on the policy issues
and thereby enhance both economic efficiency and security. RFID systems are playing a role in increasing load factors
and will still be facing some challenges that need to be overcome as to lower implementation risks
The intention of the EU policy regarding the facilitation of using e-invoicing in business is to diminish the risk of such transactions by introducing some uniform rules regarding e-invoicing throughout the European union.
Security is guaranteed via SSL encryption of information and via a dedicated login and password for each user.
It also allows companies to develop new, value-added services such as automated track and tracing systems, monitoring of document processing, security and non-repudiation.
and only shared by 12%of large firms (Exhibit 3. 7-2). A percentage of firms ranging form 25%to 39%perceive lack of reliable IT providers (25%),legal (25%)and security (31%)issues,
(250+)Security concerns 31 28 29 2435 0 20 40 60 80 100 TLS EU-7 (total) Micro (1-9) Small
costly investments bear the risk of becoming ineffective. Thus, revisiting the two initially specified working hypotheses (see 4. 1. 1
safety/security issues and environmental information allows the company to draw important conclusions when making decisions. 3. 4 Internal process integration 3. 6 Improving Customer service:
In the evaluation process to obtain new line concessions there have been traditionally some important factors like the vehicles characteristics, additional services, transport security, etc.
The centralised information system has also a positive impact on data security. It is now possible to make backup copies of all the relevant data from the central servers,
avoiding duplicating task and minimising the risk of losing important data. The system allows eliminating existing duplicated processes
This system increases the security in the service, for example ensuring the fulfilment of the vehicle revision calendar.
and security tools, implementing smart card and other types of ITS in their vehicle fleet and SAE system (Sistema de Ayuda a la Explotación or Operations Support systems)
This system has increased also the transport security and services productivity, using the alarm controls and the intelligent incidence management and real-time analysis tools.
(and help to a sustainable transport system) and also increase the transport service security, one of the key areas for a passenger transport company like ALSA.
& logistics industry 141 The security for the checkout process is very low regarding the identification of the consignee (person receiving the goods) of a cargo unit.
Increased security due to the attribution of a pick up code for the delivery of transport goods. Simplified management of their transport documentation.
Security is guaranteed via SSL encryption of information and via a dedicated login and password for each user.
offering considerable advantages in terms of time, security, and operational efficiency. E-billing is a service allowing the customer to receive,
The competitive threat for domestic UK firms such as N c. Cammack & Son for whom 98%of business is in the UK,
Security requirements include user identification and password. The typical process is as follows: when a shipment is produced,
safety/security issues and environmental information allows the company to draw important conclusions when making decisions.
defining the contracts, setting up requirements that concern the respect of E-business in the transport & logistics industry 181 passenger comfort, security and environment and controlling the respect of the requirements and the activity of the operators.
security, safety and appearance are important aspects in the choice of means of transportation. The operation and maintenance of the vehicles in accordance with the requirements specified in the agreements are part of the responsibilities of the operator.
and use and have a better control on the respect of agreed requirements by the operators in terms of comfort, quality, security and environment.
a system allowing accessing all vehicle information including accessibility, security, quality, and environment. 5. 12.2 E-business activities The solution chosen by Värmlandstrafik had been developed initially by Nordic Port and the Public transport Authority (PTA) in West Sweden,
It provides detailed information about functional disabilities, information about safety/security of transport such as bus, train and tram.
environmental impacts, in providing better security and comfort to transport passengers, and in a better standard of the overall transport service.
Transport operators have agreements to respect in terms of bus equipment, quality, security and traffic. The bus operator put the information about its vehicles and equipments into the system.
and security and to provide a better service level to the passengers. Another benefit is resulting from the reporting capabilities provided by the solution.
costly investments bear the risk of becoming ineffective. IT practitioners. Interviewed SMES often lack a coherent ICT investment strategy
this report addressed a number of interrelated issues pertaining to security and privacy, governance, radio spectrum and standards and called for an RFID Stakeholder Group to provide an open platform allowing a dialogue between consumer organisations, market actors,
E-business in the transport & logistics industry 197 E-business W@tch Special Study on ICT Security, e-Invoicing and e-Payment Activities in European Enterprises, September 2005.
Improving the competitiveness, safety and security of European shipping, Directorate-General for Energy and Transport, B-1049 Brussels:
E-business in the transport & logistics industry 201 Thomas, D. How to Keep Your Network Server Secure, INC. technology, http://technology. inc. com/security/articles/200609
Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011