There is great potential to exploit digital network effects both in social innovation activity and in new services and approaches that generate social value.
-cal mass of users and exploit the network effect Digital social innovation plays a central role in the development of the Future Internet.
and civic innovators (developers, hackers, designers) Â are key stake -holders in support of innovation for social good.
communities of civic innovators, web entrepreneurs, hackers, geeks, SMES, open source and DIY makers but also policy makers and decision makers at various levels
There is great potential to exploit digital network effects both in social innovation activity and in new ser
security, privacy and openness: the protocols are proprietary, the systems are centralised (and in particular in terms of property and decisional processes),
A major risk for the Future Internet is the realisation of the âoebig Brotherâ scenario, showing that big industrial players (mainly US based) will reinforce their dominant
-Top (OTT) and largest network operators, there is a risk that the innovation ecosystem will become more
digital social innovations that enable new types of collaborations and exploit the network effect. By using
The proposed approach to mapping and visualisation exploits the flexibility of linked data. All data points will have their own URIS that will allow mapping to Open Street Map objects.
-ties (e g. civic innovators and hackers) to design and deliver public services that meet our societiesâ chang
Chaos Computer Club (CCC), Europeâ s largest network of Hackers, is the most prominent example of grass
such as surveillance, Â privacy, freedom of information, hacktivism, data security etc. The CCC is based in Germany and otherâ German-speaking countries and currently has over 4, 000 members.
the principles of the hacker ethic, the club also fights for free access to computers and technological infra
hacker spaces Fablab Amsterdam (hosted by Waag Society Through research projects or research networks Desis network
Maker and hacker spaces 11 Other 12 Table 8 32 If we analyse these data based on all 289 organisations,
festival for hackers and makers, and the Chaos Communication Camp, an international meeting of hackers
that takes place every four years, organized by the Chaos Computer Club (CCC)( GE), an informal associa
-tion of hackers from across Europe Theâ Chaos Computer Clubâ (CCC) hosts the annual Chaos Communication Congress, the largest hacker con
-gress in Europe. Every four years, the Chaos Communication Campâ is the outdoor alternative for hackers
worldwide. The CCC started a new yearly conference called SIGINT in 2009 inâ Germany. The CCC event has
facilities (often referred to as maker and hacker spaces), for digital fabrication and hacking data that entre
There are now 96 known active hacker spaces worldwide, with 29 in the United States, Â according to Hackerspaces. org.
are many more Hacklabs around the world that are branded not as hacker spaces, but are community labs
and hacker spaces, have begun to proliferate. The MIT founded a precursor in 2002 called Fab Lab,
expanded from the electronics-centric hacker spaces to having a stronger emphasis on multi-disciplined
â¢Hacking culture as sharing skills and knowledge Running research projects or research networks With a growth in DSI practice, there has been an increase in research activities and research networks aim
and civic hackers who are developing digital social innovations Services that directly target and engage a large number of citizens and end users for a variety of causes:
There is no such thing as perfect security and ano -nymity, but projects like Tor strive to make the network as secure and anonymous as possible, while clearly
data in massive data centres with little privacy and security. The hypothesis of this model is that people
civic innovators (developers, hackers, designers) Â as key stakeholders in the support of innovation for social
The technical predominance of the hackers and other digital innovator can be overcome by digital natives present in the community itself,
verified by Geotrust, a world leader on Internet security verification The Avaaz donation pages have addresses beginning with https://rather
Security Upgrades: One challenge Avaaz was forced to overcome was a âoemassiveâ persistent cyber attack, which it believes a government or
large corporation was behind. Hours after the initial attack, the organisa -tion made a public appeal on its website,
security audits of the siteâ s servers) and Arbor networks (who provid -ed defensive hardware which helped fend off the attack) all supported
upgrade their IT SECURITY in the event of similar future attacks. Avaaz consequently launched a campaign (the first of its kind in over 5 years
asking for donations to allow for this security upgrade Avaazâ s site shows that almost 42,000 people have donated to this cam
likely be used to employ a full-time or part-time security office; upgrade to the service level for defensive tools;
helping to ensure the physical security of the organisationâ s staff According to Patel, the funds generated should support this priority for
this perceived loss of trust in politicians, these civic hackers stepped in to encourage citizen participation in governance.
under threat, especially as a result of the lack of participation by young people. They hold that the Internet is the best way to reach out and
Github so that like-minded civic hackers can contribute to and improve this coding, users are encouraged also to translate the siteâ s contents if
exploit Facebook, finding that it is one of the best ways to attract people to electronic democracy both via sharing and Facebook advertisements
infrastructures that exploit locality, react to environmental changes and rely on cross-layer optimizations Regulation can also be a barrier,
This leads to different threat models and a new notion of trust between users What helps to reach goals
ground to achieve similar assurances about other materials used in the phone and to negotiate terms with manufacturers to ensure a living
a commercial venture with global production processes, with the risk of subcontracting critical tasks to global sweatshop factories
â health food access and equality, environment, food security, and com -munity cohesion. â Part of the difficulty in assessing the impact of the project relates to the
Help streamline the design Makers can reduce risk by basing designs on open-source hardware and taking advantage of a proven design that
might be particularly suitable for civic hackers to try working on. Fur -thermore, developers are encouraged to contact the mysociety team
professionals, makers and hackers Undoubtedly, initiatives like Open Government Vienna have played a part in Vienna being voted Europeâ s most innovative city.
To ensure the site was compliant with security standards, the National Communications security Authority audited the siteâ s code
its security policies and its service/hosting providers to ensure that the details of citizens are safe
and canâ t be hacked into. The system verifies the peopleâ s identity through the APIS offered by banks and mobile
granular, structured and detailed than data from the Securities and Exchange Commission. To address issues around quality of Opencorpo
-ers, hackers, the DIY community, urbanites and crowds, events attendees and organizers. In addition large numbers of users are students, teachers
and people at the Tokyo Hacker -space took part in the initial twitter discussion about building the device
possible to produce narratives of nuclear risk as numbers, measurement data per se cannot be a useful resource for nuclear risk knowledge pro
-duction. Volunteer Geiger counter users and social media users among others are necessary to produce specific type of nuclear risk knowledge
To date, Safecast volunteers have mapped radiation levels of over 11 million data points, providing a comprehensive and accurate dataset that
As a pro-data organisation, Safecast generates nuclear risk knowledge by harnessing measurement data in multiple ways.
Internet freedom and security Technology Trends: Open networks DSI activities: Operating a web service Key Facts:
After the NSA surveillance revelations in 2013, a new wave of users joined the service. Â Between 19 august and 27 august alone the number
-prove their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy fea
video over the Tor network, improving usability, security and anonymity stronger cryptography capabilities and exciting new tools designed to
security and critical infrastructure by making communication among individuals, organisations, corporations, and governments more vul
Internet surveillance known as âoetraffic analysis. â Traffic analysis can be used to infer who is talking to whom over a public network.
Recent revelations of the NSAÂ s expansive surveillance programmes harm user trust in the digital ecosystem, stifle innovation, and lead
bolt-on security tools get protected communications, or worse yet become reluctant to use digital
a âoelayerâ of encryption to reveal only the next relay in the circuit, in order to pass the remaining encrypted data on to it.
the last layer of encryption and sends the original data, without reveal -ing or even knowing its sender, to the destination.
willing to hack into machines, theyâ re willing to run botnets. â In a recent
take risks in the pursuit of changing the traditional way that information flows. â To this end, Ushahidi builds technological tools for democratising
and continues to be a resource to the emergency response community there. A Haitian partner, Solutions, was identified
-dated computers, browsers as well as Internet communication security policy as significant obstacles to accessing the UHP website and data
At the same time, it would ensure the security of the infrastructure, helping to improve the daily lives of ordinary citizens.
competitiveness and security of supply, necessitating a coherent and consistent set of policies and measures to achieve them
assuring and improving security and quality of supply, consistent with the demands of the digital age with resilience to hazards and uncertainties
place in a coherent way addressing technical, commercial and regulatory factors, to minimise risk and
â¢Security of supply: limited primary resources of traditional energy sources, flexible storage; need for
strengthening European security of supply through enhanced transfer capabilities â¢Distributed generation (DG) and renewable energy sources (RES:
system security, while assuring adequate remuneration for their shareholders Investment remuneration and stable regulatory frameworks will be necessary for a
quality security of supply (both short and long term) in the EU Advanced electricity service and solution providers:
it reduces investment risk Smartgrids: The Vision Europeâ s electricity networks in 2020 and beyond will be
Assuring and improving security and quality of supply, consistent with the demands of the digital age
â¢The need to reduce uncertainty and risk to businesses making investment decisions â¢The progress in technology,
or about the details of investment funding and risk management â¢Itâ s not about emission trading markets or
addressing security of primary fuel â¢Itâ s not about detailed research proposals, but is rather about research themes
â¢Security and Quality of Supply: Modern society depends critically on a secure supply of energy.
increasingly threatening security, reliability and quality of supply It is time to redesign electricity grids
running out and the security of electricity supplies is under threat. Environmental issues have moved to the fore and the EU must meet targets set.
SECURITY OF SUPPLY ENVIRONMENT 14 E u R O P E A n T E C H N O L O G Y P L a T F
security and reliability of supply for the digital age Flexible, optimal and strategic grid expansion, maintenance
Thus security, safety environment, power quality and cost of supply are all being examined in new ways
This will have the potential to exploit fully the use of both large, transmission connected generators and smaller distributed power sources
security and reliability of grid operation Smartgrids will help to achieve sustainable development through using
power security, quality, reliability and availability â¢transmission grids with minimum negative side-effects on the environment and
â¢Improvements of security standards in the context of critical infrastructures â¢Integration of both central and distributed generation
â¢The perceived risk of adopting new technology will be mitigated and commercial adoption will follow when companies
â¢By definition it brings risks by and these have to be managed â¢The risk profile varies significantly across
the innovation chain and its stages â¢New grid technology cannot be fully proven in the laboratory or on
Prepare to take risks: changing a business â ¢model is a continuous process. Integrate an
chemical products, mitigating risks related to the use of chemicals and improving the data manage -ment of the chemicals2
time periods and with generally low-risk investments Creates a socially responsible image for the â
Global Risks Report 2012 ranked extreme volatil -ity of commodity prices as the fifth most important
risk in terms of potentially negative impacts7. At the same time, Europe is the world region most
Many companies are exposed to risks of raw material supply shortages, price volatility and high material prices.
World Economic Forum Global Risks Report 2012 www. weforum. org/reports/global-risks-2012-seventh-edition
8 European Environment Agency 2010: The European Environment. State and Outlook 2010. Material resources and Waste.
and lower risk by making companies less dependent on imports Eco-innovate! A guide to eco-innovation for SMES and business coaches
What are the risks and opportunities of imple-â ¢menting a sustainable supply chain manage
Evaluate risks and opportunities through a â ¢risk management approach or an opportunity -based approach Establish a common language
Set sustainability targets and procurement â ¢criteria for the supply chain Develop indicators to monitor performance. â
Evaluating risk, especially long-term costs â ¢and benefits may be challenging Understanding the environmental impacts â
-tion, risk reduction, accessibility, convenience and/or usability? How does improved envi -Business case for eco-innovation
-ness opportunities or threats Identifying product (s) environmental features â ¢and business benefits may help determine
strengths of your product that you can exploit in promotion Communications incorporating understand-â ¢able, valid and clear environmental perform
What are associated the risks with each â ¢source of funding What types of free or subsidised funding or â
life cycle, in a reduction of environmental risk pollution and other negative impacts of resources use (including energy use) compared
information on the environment and its risks; lack of knowledge (mostly from the management part
and (iii) examining any specific risks linked to the online sale of medicinal products The Commission conducted a public consultation on a common logo for legally
phone, and (iv) increasing the level of security of payments and data protection The Commission will present the conclusions of this exercise and the next stages
â¢More payment service innovation and security The Green Paper launched by a public stakeholder consultation
in 2012, propose an overall strategy on internet security in Europe aimed at better protection against cyber attacks in the EU. The
establishment of the European Cybercrime Centre by 2013 will play a particularly important role in this
In September 2010, the Commission put forward a proposal for a Directive on cyber attacks53, updating the Framework Decision on attacks against information
systems, in order to deal with the growing number of large-scale cyber attacks against businesses but also increasingly against governments as for example, the
cyber attacks against Estonia in 2007. The main novelty of the proposal is the criminalisation of the use as well as the production and sale of tools (widely known
as'botnets')to carry out attacks against information systems. The Council and the European parliament reached a political agreement on a compromise text in early
Cybercrime Centre, hosted within Europol and officially launched in January 2013 The Centre acts as the focal point in the fight against cybercrime in the Union and
will have four core functions â¢To serve as the European cybercrime information focal point â¢To pool European cybercrime expertise to support Member States
50 COM (2013) 209 51 Known as Alternative dispute resolution (ADR)/ On line dispute resolution (ODR
52 COM (2011) 793 final and COM (2011) 794 final COM (2011) 793 final http://ec. europa. eu/consumers/redress cons/docs/directive adr en. pdf and COM (2011) 794 final
â¢To provide support to Member States'cybercrime investigations â¢To become the collective voice of European cybercrime investigators (across
law enforcement and the judiciary might delete Other functions of the Centre will include the strengthening of forensic law
enforcement capabilities for cybercrime investigations, and better cooperation between relevant agencies, including Europol, Eurojust, CEPOL and ENISA
Security policy adopted a comprehensive Cybersecurity Strategy of the European Union entitled âoean open, safe and secure cyberspaceâ.
systems, reducing cybercrime and strenghthening EU international cyber-securtiry policy and cyber defense while respecting
cooperation, and awareness in the field of Network and Information security for the public and private sectors both at national and EU level
â¢Substantially reducing cybercrime by strengthening legislation, by further building the expertise of those in charge of investigating and prosecuting
cybercrime, by adopting a more coordinated approach between Law Enforcement Agencies across the Union, and by enhancing cooperation with
The European Cybercrime Centre will be one of the main tools in this regard â¢Developing an EU Cyber Defence policy and capabilities, inter alia in the
framework of the Common Security and Defence policy â¢Fostering industrial and technological resources for cybersecurity:
stimulate the emergence of a European industry and market for secure ICT and contribute to
to improve cybersecurity and combat cybercrime and cyber terrorism â¢Establishing a coherent international cyberspace policy for the European union
outside the EU in building cybersecurity capacity In parallel to the Strategy, the Commission has proposed a legislative initiative
on a high level of network and information security across the Union 21 3. 5 DEPLOY HIGH-SPEED NETWORKS AND ADVANCED TECHNOLOGICAL SOLUTIONS
appropriate IT SECURITY and data protection measures, as well as technical and organisational measures and the appropriate safeguards for data transfers
and legal certainty, they present the risk that they undermine the strengths of ADR and ODR, in terms of
significant imbalance for businesses in terms of security requirements and additional costs. It is also doubtful whether consumers welcome this excessive formalism
thereby providing them with a false sense of security, data subjects should be educated on how they can protect their
reduce cybercrime and fraud â¢E-Identification-based schemes would allow effective age verification, which would be useful for age-dependent
online, payments, handling waste, and cybercrime. In other areas, there is either a lack of legislation or a late development of legislation fitted to the digital way of
1. 6. Combat fraud and cybercrime 1. 7. Freedom for a business to trade or not â Art. 20 (2) Services Directive
contracts, the right of withdrawal, delivery, the passing of risk, etc. but not all (e g
iii) establish ground-rules for the security of payments online -The multilateral interchange fee (MIF) Regulation:
All payment channels must operate with equal ease and security Therefore a coherent set of standards for SEPA payments must be devised which strikes a
and security needed by users and the flexibility required by innovators. All market participants must
1. 6. COMBAT FRAUD AND CYBERCRIME Consumers and bona fide businesses both suffer from cybercrime, misleading marketing
identity fraud, payment fraud, etc. Currently, it affects a small part of all transactions However, as online transactions grow exponentially,
so does fraud and cybercrime. This is a major concern for bona fide merchants and traders. Protecting against this scourge creates
that cybercriminals operate across borders while the Member States still act mainly on a national basis;
The EU must make the combat of cybercrime a priority and enhance cooperation between Commission and Member States,
and better security education of consumers 1. 7. FREEDOM TO TRADE (OR NOT It is essential that businesses retain the freedom to choose in which markets he/she chooses
Also, the trust between market surveillance authorities between the different Member States is low. As a result, testing and risk
assessments that have already been performed, are repeated unnecessarily. Mutual recognition of those would considerably lighten the burden
potential benefits and risks of new technologies ICT vendors have a responsibility to build awareness as well
creation and risk-taking, for example by reducing the penalties for bankruptcy. At the same time managers have a responsibility to entrench and
ingrained aversion to risk and change. However countries such as Ireland and Sweden show what can
competition, security of the Internet infrastructure, government support for ICT development, laws governing the Internet, ICT skills of the workforce and quality of ICT supporting services.
take risks and embark on new ventures. According to Tarek Ghouri director of government practice for Nokia Enterprise
entrepreneurial deficit and ingrained risk aversion compared to the US is a relatively noncontroversial view, accepted by virtually all the studies we have
a willingness to take risks. Empirical research indicates that new firms tend to be the most innovative in their
more innovative countries tend to be risk-averse Martti af Heurlin, deputy director-general of Tekes
security they enjoy with their existing large firms The European commission has been sufficiently concerned by this issue to launch a number of
and says Europeâ s risk-averse business culture does not encourage managers to innovate The more familiar a firm is with changing structures
At the risk of adopting yet another management fad, this suggests that Europeâ s managers must take on board
Security, standards and intellectual property In each of the areas discussed above, most European countries compare unfavourably with the US.
The first is security. A large and growing proportion of Europeâ s business transactions are conducted now
enforced standards of network security as well as trust in payment systems, digital identities and digital contracts is vital to encourage more business leaders
develop unified security standards to protect Europeâ s network infrastructure. Challenges in developing effective, common authentication protocols are
awareness among firms of security threats and of options for dealing with them. When it comes to
security threats such as viruses, SMES are thought to be particularly vulnerable as they tend to have fewer
remove much of the risk associated with investing in competing technologies. Europeans fondly recall the
of a threat to innovative activity in this field. At the time of writing, the revised European commission
will need to understand better the benefits, risks and Part III Unleashing the enablers of growth
creation and risk-taking. Reducing the complexity of tax compliance, streamlining the approval and registration of ownership changes, and lowering
new challenges and exploit technologyâ s potential to the full 3. Redouble the assault on barriers to competition
and thereby helps avoid the risk of confusing the role of ICT with other variables.
â A qualitative indicator of the security of the Internet infrastructure â An indicator of the government's role
EUISS EU Institute for Security Studies HDI Human Development Index (United nations ICT information and communication technology
SCENIHR Scientific Committee on Emerging and Newly Identified Health Risks 4 Preface This Research Report forms part of our series on global societal trends and their impact on the EU in
The initial effort, carried out by the EU Institute for Security Studies (EUISS 2012), aimed at assessing
Identified Health Risks SCENIHR 2009; Siegrist 2010 While NBIC technologies may be expected to bring along cumulatively substantial societal changes until
Hacker et al. 2009. As new technologies are presumed to represent an S-shaped adoption curve, it
but also as potential threats to human dignity and autonomy (Heersmink 2011 Hildebrandt 2012; Wright 2011
and security â although the level of prioritisation of these values may vary along socio-demographic lines
citizens and as a pool of data for surveillance purposes. Since the beginning of the 2000s analysis by
However, it has to be kept in mind that data mining is not only a tool for the surveillance of citizens and
Growing surveillance and data mining create tensions between citizens and governments Technological progress and growing degree of
security concerns connected to cyberspace Government data requests revealed by ISPS composite indicators such as Opennet Initiative data
wildcards such as internet/surveillance policies of foreign states High Spread of rationalâ secular value systems will develop
"Sustainable Food security for All by 2020, September 4-6, 2011, Bonn, Germany, 2001. As of 08/03/2013:
Chief of Force Development, Future Security Environment 2008-2030 Part 1: Current and Emerging Trends, 2009.
European union Institute for Security Studies, 2012 Eurobarometer, Life sciences and Biotechnology, Brussels: European commission, 2010 â â â, Consumer attitudes towards cross-border trade and consumer protection-Analytical report, Eurostat
â â â, Cybersecurity, Brussels: European commission, 2012b Eurofound, Third European Quality of life Survey-Quality of life in Europe:
European Agency for Safety and Health At work, Foresight of New and Emerging Risks to Occupational
. and Melling, K.,Gender inequalities in the risks of poverty and social exclusion for disadvantaged groups in thirty European countries, Expert Group on Gender, Social Inclusion and
Hacker, K. L.,Mason, S m, . & Morgan, E. L. 2009). Digital disempowerment in a network society
Maleckova, J. 2005. âoeimpoverished terrorists: stereotype or reality? â, in Tore Bjã¸rgo (Ed.),Root Causes of
Terrorism. Myths, reality and ways forward. London: Routledge pp. 33-42 Manyika, J.,M. Chui, B. Brown, J. Bughin, R. Dobbs, C. Roxburgh,
and John Rice,"Cybercrime: Understanding and addressing the concerns of stakeholders "Computers & Security, Vol. 30, No. 8, 2011, pp. 803-814
http://www. sciencedirect. com/science/article/pii/S016740481100085x Mathers, C. D, . and D. Loncar,"Projections of global mortality and burden of disease from 2002 to
Mcafee, Prospective Analysis on Trends in Cybercrime from 2011 to 2020,2011 Mcdonald, P.,âoetime for Action:
â â â, Risk and Regulatory Policy; Improving the Governance of Risk, OECD, 2010 â â â, âoedivided We Stand:
Why Inequality Keeps Risingâ, Paris; OECD Publishing, 2011. As of August 2012: http://dx. doi. org/10.1787/9789264119536-en
Understanding the Security, Privacy and Trust Challenges JSTOR, 2011 Robison, K. K, . and E. M. Crenshaw,"Reevaluating the Global Digital divide:
Scientific Committee on Emerging and Newly Identified Health Risks (SCENIHR), Risk Assessment of Products of Nanotechnologies European commission, Directorate-general for Health and Consumers
and Ecological Risk Assessment, Vol. 16, No. 4, 2010, pp. 837-846 Sigle-Rushton, W.,"England and Wales:
Sozer, M. A. and Sever, M. 2011. âoeviolent Extremism in Terrorist organizations: The Case of Turkish
I. Bal, S. Ozeren and M. A. Sozer (eds) NATO Science for Peace and Security Series
Multifaceted Approach to Radicalization in Terrorist Organizations. Pages 22 â 31 Stewart, S. T.,D. M. Cutler,
middle age and future risk of dementia: a 27 year longitudinal population based study,"BMJ, Vol
Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011