List of Key Challenges

The List of Key Challenges identifies cross-cutting issues that combine societal relevance with ICT fields of research and innovation. This resource provides a problem-oriented view, focusing on shared challenges and issues.

  • The key challenges defined that will be the focus of the HubIT stakeholder network activities.
  • Cross-cutting issues that combine societal relevance with ICT fields of research and innovation These resource provides a catalogue of such challenges relevant in ICT and SSH. Each of these key challenges will be expanded and emphasize shared concerns among stakeholders.
Save water

ICT has been recognised as a key enabler for innovation in water management to develop new technologies to smart up the drinking water and waste water networks so as to find leakages more quickly, guarantee water supply and quality and prevent waste of water. They also enable water authorities and consumers to receive real time information on these parameters.

Smart mobility solutions

Human error is involved in 95% of all traffic accidents on Europe’s roads. More than 30 000 people are killed and 1.5 million injured in them every year. Road transport also burns one quarter of the European Union’s overall energy consumption, with one fifth of the EU’s CO2 emissions caused by road vehicles. Intelligent Transport Systems, which are based on the powers of sensors, computers and telecom, can make a major difference to these figures. Thanks to stand-alone and cooperative systems, living in a city with improved safety for all road users, reduced traffic jams and shorter and more predictable journey times, is possible. These systems sense the car’s environment and assist the driver in his driving task or wirelessly “talk” to each other, the immediate road-side infrastructure or the wider transport management centres.

Green transportation

To develop cooperative systems to help transportion to reduce its environmental impact

Cross-border public services for an easier life

In many European countries, citizens have identity cards and use them when interacting with public authorities. Electronic identification (eID) schemes can make these interactions much simpler for citizens and more costeffective for administrations. However, most online public services do not work across borders, or else involve heavy procedures. Interoperability allows the possibility of different systems and organisations to cooperate and exchange information electronically.

European cultural heritage at hand and preservation of digital memory

The pervasiveness of digital technologies in the everyday life is changing the way citizens, especially young digital natives, expect to access cultural content. The cultural institutions, such as museums and galleries are looking at more attractive solutions to offer their visitors more interactive and engaging experiences. This could be done, for example, by capitalising on the resources available in recently developed digital libraries.

Living in inclusive society

Building an inclusive society implies that people that are usually marginalized get opportunities to better communicate, interact and integrate with the external environment. Digital technologies such as serious games can for example help to overcome marginalisation of the young by using the ICT tools youngsters are most familiar with: videogames. Serious games simulate real situations and processes with the aim of solving a problem, for example antisocial behaviour. They offer the advantages of repeatable experiences such as stress in social situations, experienced by the user in real life.

Online privacy and electronic identity

While using the Internet you often entrust vital personal information, such as your name, address, and credit card number, to your Internet Service Provider and to the website. As securing these transactions requires strong authentication, electronic authentication tokens and mechanisms have become common. But what about cases where you don’t use tokens? The key challenge is to protect privacy in emerging applications, like collaborative processes, participation in virtual communities or the use of personalised services, maintaining life-long privacy control.

Moving public services to the Cloud

Public administration are often organised in silos: monolithic architecture models make it difficult to re-use services for the development of new applications. The development and the delivery of cloud public services allows a more flexible solution by combining building blocks and allowing service sharing between public and private providers.

Security of networks

Trust is the core of social and economic activity in the Internet, and is the basis of economic transactions, social connections, and communication between people and organisations. As we increasingly rely on broadband networks, it is extremely important to make them more secure and trustworthy and protect them against any kind of accidental or deliberate failure.Strong cooperation between EU governments, public bodies and private companies for improving information exchange and for ensuring that security problems are addressed quickly and effectively.

Combating cyber-crime

Development of an open standard investigation framework for consistent and systematic malware analysis. Combating cyber-crime becomes increasingly hard, for multiple reasons: • Malicious software is designed to defeat today’s best practices from technological and economic points of view. • Organizations are consolidating malicious activities into profitable professional endeavours. A lot can be gained by exchanging information on vulnerabilities or attacks. However, private sector and national security authorities are reluctant to share information unless they have a system they can fully trust. These limitations have prevented the emergence of an open standard investigation framework for consistent and systematic malware analysis.

Be a part of HubIT

Do you have additional inputs for this resource? Do you want to propose an improvement? Leave us your contribution.

click here