1 / 21

DIRoS & Delft University of Technology

The Development of the Public Safety Standard TETRA Lessons and Recommendations for Research Managers and Strategists in the Security Industry Simone Wurster 1 , Tineke M. Egyedi 2 and Anique Hommels 3. DIRoS & Delft University of Technology. Introduction - Definitions.

levi
Download Presentation

DIRoS & Delft University of Technology

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Development of the Public Safety Standard TETRA Lessons and Recommendations for Research Managers and Strategists in the Security IndustrySimone Wurster1, Tineke M. Egyedi2and AniqueHommels3 DIRoS & Delft University of Technology

  2. Introduction - Definitions ‘a system of measures, including their embodiments and their interactions, designed to ward off intentionally destructive activity resulting in injury or material damage’ (Sinay, 2011) Two kinds of security (European Commission, 2011): security public security (security of the society) information and communication technology (ICT) security Public security ‘includes among others, protection against threats by terrorism, severe and organised crime, natural disasters, pandemics and major technical accidents’. (European Commission, 2011)

  3. The International and European Security Industry National security research in many countries In addition: EU sec. research EUR 1.4 billion • Need for security-related standards highlighted by several recent studies, e.g. ECORYS (2009) and Sáez et al. (2009) • European Commission launched Security Standardization Mandate (M/487) in 2011, made security standardisation key issue for European stakeholders of security solutions products solutions services Global market: EUR 100 billion European market EUR 26-36.5 billion

  4. The International and European Security Industry and the Role of Standards To stimulate lead markets for security-related technologies and services, standards may…. provide knowledge & technology transfer provide innovation-enhancing regulatory frameworks increase exportability foster innovative demand connect relevant stakeholders intensify competition Blind (2008)

  5. The International and European Security Industry and the Role of Standards competitiveness market defragmentation compatibility central focus on… common solutions interoperability data protection privacy law related standards

  6. Literature Review and Research Gap Selected findings: Sherif et al. (2007): six dimensions are essential for the success of a standardisation project: scope management, time management, quality management, cost management, resource management and documentation management. Weiss & Sirbu (1990) identified several success factors but indicated insignificance of political skills of sponsors Selected research gaps: Lack of recommendations on how to pursue national interests in an international arena Nearly no standardisation studies in the security field • Current studies provide no information on: • role of security experts, • security standardisation aspects on European & national level • relationship between security politics and industry

  7. Research Questions

  8. Scientific Approach and Research Framework Basis: case study based mainly on primary sources • The two Dutch authors consulted • public and private archives from the Schengen Telecom group, • the archives of the Dutch Ministry of the Interior, • the standardisation archives of ETSI and the Dutch organisation of ETSI representatives. • Interviews with key actors involved in development of the TETRA standard including • user groups, • governments, • industry, • ETSI, and • the European Commission.

  9. Description of the TETRA Standard TETRA = Terrestrial Trunked Radio: ‘a standard for Professional Mobile Radio communications and public safety network specifically designed ‘for use by government agencies, emergency services and rail transportation staff (…)’. (ECORYS, 2009, p. 323) Trunking: ‘a technique where the resources of the communications network are shared, thus providing both flexibility and economy in the allocation of network resources’ (ETSI, 2012)

  10. Description of the TETRA Standard • High-end PMR market valueestimated at EUR 6 billion (ECORYS, 2009). • Analogue and digital (trunked) communications schemes. • High-end digital PMR systems represent ca. 30% of total market in value terms with the following approximate end-application market breakdown: (ECORYS, 2009, p. 220) Public safety: 60% to 70% of market in value terms Critical infrastructure: 10% • Defence: • <5% Mass transportation: 15% to 25%

  11. Milestones in TETRA’s development • Started life in 1989 as Mobile Digital Trunked Radio System (MDTRS) • Early 90s’: name changed to Trans European Trunked Radio (TETRA) • Mid 90s’: meaning of the TETRA acronym changed to Terrestrial Trunked Radio as global market potential become apparent • 1994 Schengen agreement created new frame conditions • December 1994 signing of the TETRA MoU • First TETRA standards released in 1995 • First TETRA system became operational in July 1997 • In November 2004, the TETRA MoU Association reported that 622 contracts had been placed for TETRA spanning 70 countries world-wide • In 2008 TETRA is major standard for digital high-end PMR equipment in Europe and available worldwide

  12. Activities of the Netherlands • Early 1990s: goal to develop a new national radio communication network for emergency services • Aim to base it on a common European standard, involvement in efforts at ETSI • 1994: ministers responsible for police matters in the European member states set up a consultative structure for their mutual coordination • The Netherlands = the largest advocate of selecting TETRA • 1994: strong shared ‘technological frame’, accepted key problem: outdated communication systems of the Dutch police • TETRA was considered to be the best solution • December 1994: MuO signaled collective support for TETRA • Actively lobbying for its adoption in other European countries

  13. Activities of the Netherlands • 1998: TETRA gains ground in Europe • October 1998: seven countries had chosen for TETRA • But: Dutch deputy minister for the Interior identified risks: if the remaining countries would choose a different standard, that would hinder cross-border communication • He started lobbying directly for TETRA among the remaining and -at that time- candidate European member states • Latter countries eventually decided to opt for TETRA as well • AND: TETRA’s diffusion continued…. ->

  14. TETRA Today Borgonjen (2011)

  15. Conclusions • Security field is more heterogeneous and thus more complex than many others, because of diverse public interests in security in addition to more usual industry-motivated interests • Dutch example shows: national markets can be too small for manufacturers of certain security technologies to develop products solely for this market • Single European (or international) standards can provide price advantages, choice of supplier and technical alternatives. • Political skills, lobbying and negotiation activities of sponsors of a technology highly significant for its adoption in standardisation • In particular, two influential aspects: MoU which united key players and formulation of common goal by Dutch security actors • Allies on European level can support preferred outcome

  16. Recommendations for Researchers, Security Research Managers and Industry Strategists Four security-related recommendations: General recommendation: .

  17. Outlook Need for more extensive research: • To corroborate the relevance of our extension of Sherif et al’s (2007)framework: to include the relevance of a specific PR management dimension: • To understand the needs of the players in the national security industry. • To better understand the processes and conditions of collaboration between politics and industry, and between standardisation and political influencers.

  18. Thankyouverymuchforyourattention! Picture: Flinders University, http://www.flinders.edu.au/sabs/ir/

  19. Selected References (1) • Axelrod, R., S. Bennett, E. Bruderer, W. Mitchell, R. Thomas. (1995). Coalition formation in standard-setting alliances. Management Science 41, 1493–1508. • Bekkers, R. (2001). The development of European mobile telecommunications standards: An assessment of the success of GSM, TETRA, ERMES and UMTS (doctoral dissertation). Eindhoven University of Technology, The Netherlands. • Blind, K. (2004). The economics of standards: Theory, evidence, policy. Cheltenham, UK: Edward Elgar Publishing. • Blind, K. (2008). Standardisation and Standards in Security Research and Emerging Security Markets. Fraunhofer Symposium 'Future Security', 3rd Security Research Conference Karlsruhe, 10th - 11th September 2008, 63-72. • Borgonjen, H. (2011). Public Safety Radio communication in Europe, Presentation in Istanbul February 2011. http://www.tandcca.com/Library/Documents/TETRA_Resources/Library/Presentations/Turkey2011Borgonjen.pdf. • Byrne, B. (2004). Qualitative interviewing. In C. Seale (Ed.), Researching society and culture (2nd ed.), London: SAGE, 179-192. • COMPASS (2012). D11.1 Convergence Report 1. http://www.compass-research.eu/Project/Deliverables/D111.pdf. 3. • ECORYS (2009). Study on Competitiveness of the EU Security Industry. http://ec.europa.eu/enterprise/policies/security/files/study_on_the_competitiveness_of_the_eu_security_industry_en.pdf. • ECORYS (2011). Security Regulation, Conformity Assessment & Certification. Final Report. http://ec.europa.eu/enterprise/policies/security/files/doc/secerca_final_report_volume__1_main_report_en.pdf. • Egyedi, T. M., Blind, K. (2008). The dynamics of standards. Cheltenham, UK. • Eisenhardt, K. M. (1989). Building Theories from Case Study Research. In: Academy of Management Review, 14(4), 532–550. • ETSI (2012). Private Mobile Radio. http://www.etsi.org/technologies-clusters/technologies/digital-mobile-radio/private-mobile-radio. • European Commission (2011). Programming Mandate Addressed to CEN, CENELEC and ETSI to Establish Security Standards. ftp://ftp.cencenelec.eu/CENELEC/EuropeanMandates/M_487.pdf. • European Commission (2012). Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation). http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2012:0011:FIN:EN:PDF. • Farrell, J., Saloner, G. (1986): Installed Base and Compatibility: Innovation, Product Preannouncements, and Predation, American Economic Review 76-5, 940-955. • Gray, D. (o.d.) An Overview of TETRA. http://www.ik4hdq.net/doc/tetra/tetrainfo.pdf.

  20. Selected References (2) • Haskins, C. [ed.] (2006). INCOSE Systems Engineering Handbook v3, INCOSE-TP-2003-002-03, International Council on Systems Engineering, June 2006. • Hommels, A., Egyedi, T.M. (2010). Beyond the 'Point of No Return': Constructing Irreversibility in Decision Making on the Tetra Standard in Dutch Emergency Communication. International Journal of IT Standards & Standardisation Research, 8/1, 28-48. • Hommels, A., T.M. Egyedi and E. Cleophas (2012). Policy change and policy incoherence: The case of competition versus public safety in standardization policies, Journal of European Integration, DOI:10.1080/07036337.2012.711826. • InfraNorm (2011). Bedeutung von Sicherheitsnormen, -standards und -spezifikationen. http://www.inno.tu-berlin.de/menue/publikationen/reports/ • Leiponen, A. (2008). Competing Through Cooperation: The Organization of Standard Setting in Wireless Telecommunications. Management Science 54-11, 1904-1919. • Loewer, U. M. (2006). Interorganisational standards. Heidelberg 2006. • NEN (In assignment of EC DG Enterprise and Industry (2013). Mandate M/487 to Establish Security Standards. Final Report Phase 1 Analysis of the Current Security Landscape. ftp://ftp.cen.eu/CEN/Sectors/List/SecurityandDefence/SecurityoftheCitizen/M487Phase1_report.pdf. • PRISE (2008). Deliverable - 3.3 Proposal Report. Privacy enhancing shaping of security research and technology – A participatory approach to develop acceptable and accepted principles for European Security Industries and Policies. http://www.prise.oeaw.ac.at/ docs/PRISE_D3.3_Proposal_Report.pdf. • Sáez, A. C., Urech, A., Pereira, J. (2009). Current status of Security in Mass Transport. DEMASST Deliverable 3.1: Current status of security in mass transport, November 2009. • Schmidt, S., Werle, R. (1998). Coordinating Technology: Studies in the International Stand-ardization of Telecommunications. Cambridge, MA, London 1998. • Shapiro, C., Varian, H. R. (1999). Art of Standard Wars. California Management Review, 41(2), 8-32. • Sherif, M. H. (2001). Contribution Towards A Theory Of Standardisation In Telecommunications. Paper presented at the 1st IEEE Conference on Standardisation and Innovation in Information Technology, Aachen 1999. www-i4.informatik.rwth-aachen.de/~jakobs/ siit99/proceedings/ Sherif.doc. • Sherif, M. H., Jakobs, K. Egyedi, T. M. (2007). Standards of quality and quality of standards for Telecommunications and Information Technologies. In Hoerlesberger, M. Elnawawi, M., Khalil, T. (Eds.). Challenges in the Management of New Technologies. Singapore 2007, 427-447.

  21. Selected References (3) • Sinay, J. (2011). Security Research and Safety Aspects in Slovakia. In: Thoma, K. [ed.] (2010). European Perspectives on Security Research. Berlin Heidelberg 2011, 81-90. • Spring, M.B. et al. (1995). Improving the Standardisation Process: Working with Bulldogs and Turtles. In: Kahin, B. & Abbate, J. (eds.), Standards Policy for Information Infrastructure, Massachusetts: The MIT Press. • Swann, P. (2000). The economics of standardisation. Final Report for Standards and Technical Regulations Directorate Department of Trade and Industry. Manchester, UK: Manchester Business School. • Swann, P. (2010). The economics of standardisation: an update. London, UK: UK Department for Business, Innovation and Skills. • Weiss, M. B. H., Sirbu M. (1990). Technological Choice in Voluntary Standards Committees: An Empirical Analysis, Economics of Innovation and New Technology, 111-133. • Wurster, S. (2013a). Development of a Specification for Data Interchange Between Information Systems in Civil Hazard Prevention. Identification of Success Factors, Challenges and Solutions Based on Case Study Research. The International Journal of IT Standards and Standardization Research (IJITSR), 11(1), Mai 2013, 46-66. • Wurster, S. (2013b). Ethical and Privacy Specific Risks – Flaws of Critical Infrastructure Protection and Solutions Offered by Standardisation. Proceedings of the 18th EURAS Annual Standardization Conference - Standards and Innovation-, 413-427. • Wurster, S. (2013c). Normungshandbuch für die Teilnehmer des deutschen Forschungsprogramms für die zivile Sicherheit (working title). Forthcoming. • Yin, R. K. (2009), Case study research: design and methods (4th ed.), Thousand Oaks, CA: Sage Publications.

More Related