Community Research and Development Information Service - CORDIS


ETCETERA — Result In Brief

Project ID: 261512
Funded under: FP7-SECURITY
Country: Germany

Security research planning on a European level

Europe's security relies on access to general and dedicated technologies. An EU project examined hundreds of these technologies, highlighting the most critical and providing guidance for security technology priorisation as well as for security research planning.
Security research planning on a European level
Securing sustainable access to essential security technologies is a priority of the European Commission. This requires sound priorisation of research and technology options.

The 'Evaluation of critical and emerging technologies for the elaboration of a security research agenda' (ETCETERA) project assessed technologies critical for providing security in Europe. The technologies were were checked for dependencies on extra-European sources. Furthermore, technologies that are now just emerging and will reach maturity in 10 to 15 years were assessed concerning their relevance for European security.

Using the STACCATO taxonomy as a basis, a set of more than 200 technologies indispensable to European security was evaluated for dependencies on non-European sources. Where dependencies exist (e.g. radiation detectors and X-ray scanners), the group proposed research avenues to investigate and help overcome them. The consortium also conducted a similar evaluation of a set of more than 120 emerging technologies with security implications using three methods that were employed simultaneously. The candidates were ranked according to expected impact between 2020 and 2030. Among the vital areas identified were encryption methods, communication systems, sensors, mobility technologies and advanced algorithms.

In order to achieve the project’s objectives, a plethora of methods was employed, including desktop research, scientometrics and aa weighted-bit assessment method to aggregate expert opinion. Other methods included an adapted TEPID-OIL filtering methodology (ITIPOLITRE) and parallel workshops applying the World Café method. A a dedicated Security Emerging Technology Assessment Game (SETAG) and a complex scenario process was also used.

Some of these methods have been specifically developed for the ETCTERA project and/or applied in the context of security research planning for the first time. A comparative analysis of the methods applied was performed and recommendations for their employment in security research planning were made. This will facilitate better choices concerning methodology in future planning efforts.

Thanks to ETCETERA, the European Commission is now equipped with more information regarding priorities for security technologies and provided with a toolbox of diverse methods for security research planning.

Related information




security, critical technologies, emerging technologies, research planning, methodology
Follow us on: RSS Facebook Twitter YouTube Managed by the EU Publications Office Top