List of Key Challenges

The List of Key Challenges identifies cross-cutting issues that combine societal relevance with ICT fields of research and innovation. This resource provides a problem-oriented view, focusing on shared challenges and issues.

  • The key challenges defined that will be the focus of the HubIT stakeholder network activities.
  • Cross-cutting issues that combine societal relevance with ICT fields of research and innovation These resource provides a catalogue of such challenges relevant in ICT and SSH. Each of these key challenges will be expanded and emphasize shared concerns among stakeholders.
Defending ICT infrastructures
2018-11-29

The Internet has evolved significantly over time, and people have come to depend on it for a number of activities such as voice and video communications, social networking, online banking, e-government and shopping. Trust is the core of social and economic activity in the Internet, and is the basis of economic transactions, social connections, and communication between people and organisations. As we increasingly rely on broadband networks, it is extremely important to make them more secure and trustworthy and protect them against any kind of accidental or deliberate failure. Over the past decade we have witnessed an ever-increasing amount of cyber attacks on the Internet. Ranging in style from large-scale worms to phishing attempts, cyber attacks have evolved to unprecedented levels of sophistication. To counter these phenomena, defenders are (mostly) developing safeguards after the attacks are made. In the meantime, while defenders are busy with mending the fences, attackers have already developed and planned their next strike. We are facing an asymmetrical threat; unless addressed, this asymmetrical threat will have the defenders locked into a vicious cycle: chasing after attackers without ever being able to catch up.

Trust, privacy and identity in the digital economy
2018-11-29

The information society has deeply and irreversibly transformed our society. In digital interactions such as social networks and forums, individuals are leaving a life-long trail of personal data. The number of transactions performed electronically is rising fast. Every day people use the Internet for purposes ranging from accessing information to electronic commerce and e-banking, to interactions with government bodies. As securing these transactions requires strong authentication, electronic authentication tokens and mechanisms have become common. The key challenge is to protect privacy in emerging applications, like collaborative processes, participation in virtual communities or the use of personalised services, maintaining life-long privacy control.

Secure and trustworthy service infrastructures
2018-11-29

Today, tens of millions of users rely on the internet to do business and access a wide variety of applications and services. Examples include banking transactions, voice over IP, e-government services, e-commerce and business-to-business interactions. Trustworthy applications and services, and their underlying software-based service platforms, are a prerequisite for the use and uptake of innovative business models and services that benefit the further development and growth of the European economy. The Future Internet will provide an environment in which a diverse range of services are offered by a diverse range of suppliers. Users are likely to unknowingly invoke underlying services in a dynamic and ad hoc manner. Moving from today’s static services, we will see service consumers that mix and match service components depending on attributes such as availability, quality, price and security. Thus, the applications that end users see may be composed of multiple services from many different providers. The consequence is that the end user may have little guarantee that a particular service or service supplier will actually offer the security claimed.

Changing behaviour at home as well as at work
2018-11-29

Everyone can contribute to lowering our energy consumption. Awareness is the first step towards the improvement of energy use.

Saving energy in public buildings and spaces
2018-11-29

Until recently, the focus of energy reduction in public buildings/spaces has been primarily in schools and offices. Hospitals, however, also use a large amount of energy.

Connecting smart buildings to smart grids
2018-11-29

Connecting ICT devices to smart grids is another source of energy savings which is considered as one of the sustainable solutions to invest in now and for the future.

Reducing the energy consumption of Data Centres
2018-11-29

In the era of information and data deluge, data centres play an increasingly critical role in every aspect of our socio-economic activity. While there is an insatiable need for more computation and storage power, the energy consumption in data centres poses an “energy wall” that must be addressed to be able to advance to more powerful data centres. Moreover experience has shown that up to now only a holistic approach leads to the most efficient and sustainable solutions. This starts from the decision on the data centres location all the way up to the technologies used in the various systems, and the reuse of the heat that is produced by them.

Smart mobility solutions
2018-11-29

Human error is involved in 95% of all traffic accidents on Europe’s roads, in which more than 30 000 people are killed and 1.5 million injured every year. Road transport also burns one quarter of the European Union’s overall energy consumption, with one fifth of the EU’s CO2 emissions caused by road vehicles. eSafety “smart” technologies, based on the powers of computers and telecoms, can make a major difference to these figures.

Protect privacy and identity in the digital economy
2018-11-30

The number of transactions performed electronically is rising fast. Every day people use the Internet for purposes ranging from accessing information to electronic commerce and e-banking, to interactions with government bodies. As securing these transactions requires strong authentication, electronic authentication tokens and mechanisms have become common.

Be a part of HubIT

Do you have additional inputs for this resource? Do you want to propose an improvement? Leave us your contribution.

click here