{"id":11131,"date":"2022-03-04T15:00:07","date_gmt":"2022-03-04T14:00:07","guid":{"rendered":"https:\/\/blog.rwth-aachen.de\/itc\/?p=11131"},"modified":"2026-02-10T16:28:32","modified_gmt":"2026-02-10T15:28:32","slug":"zki-top-trends-umfrage","status":"publish","type":"post","link":"https:\/\/blog.rwth-aachen.de\/itc\/en\/2022\/03\/04\/zki-top-trends-umfrage\/","title":{"rendered":"Results of the ZKI Top Trends Survey-2022"},"content":{"rendered":"<div class=\"twoclick_social_bookmarks_post_11131 social_share_privacy clearfix 1.6.4 locale-en_US sprite-en_US\"><\/div><div class=\"twoclick-js\"><script type=\"text\/javascript\">\/* <![CDATA[ *\/\njQuery(document).ready(function($){if($('.twoclick_social_bookmarks_post_11131')){$('.twoclick_social_bookmarks_post_11131').socialSharePrivacy({\"txt_help\":\"Wenn Sie diese Felder durch einen Klick aktivieren, werden Informationen an Facebook, Twitter, Flattr, Xing, t3n, LinkedIn, Pinterest oder Google eventuell ins Ausland \\u00fcbertragen und unter Umst\\u00e4nden auch dort gespeichert. N\\u00e4heres erfahren Sie durch einen Klick auf das <em>i<\\\/em>.\",\"settings_perma\":\"Dauerhaft aktivieren und Daten\\u00fcber-tragung zustimmen:\",\"info_link\":\"http:\\\/\\\/www.heise.de\\\/ct\\\/artikel\\\/2-Klicks-fuer-mehr-Datenschutz-1333879.html\",\"uri\":\"https:\\\/\\\/blog.rwth-aachen.de\\\/itc\\\/en\\\/2022\\\/03\\\/04\\\/zki-top-trends-umfrage\\\/\",\"post_id\":11131,\"post_title_referrer_track\":\"Results+of+the+ZKI+Top+Trends+Survey-2022\",\"display_infobox\":\"on\"});}});\n\/* ]]> *\/<\/script><\/div><p><div id=\"attachment_11152\" style=\"width: 310px\" class=\"wp-caption alignright\"><a href=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2022\/03\/pexels-thisisengineering-3861969-1-scaled.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-11152\" class=\"size-medium wp-image-11152\" src=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2022\/03\/pexels-thisisengineering-3861969-1-300x200.jpg\" alt=\"Woman in IT landscape\" width=\"300\" height=\"200\" srcset=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2022\/03\/pexels-thisisengineering-3861969-1-300x200.jpg 300w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2022\/03\/pexels-thisisengineering-3861969-1-1024x683.jpg 1024w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2022\/03\/pexels-thisisengineering-3861969-1-768x512.jpg 768w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2022\/03\/pexels-thisisengineering-3861969-1-1536x1024.jpg 1536w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2022\/03\/pexels-thisisengineering-3861969-1-2048x1366.jpg 2048w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-11152\" class=\"wp-caption-text\">Source: <a href=\"https:\/\/www.pexels.com\/de-de\/foto\/code-uber-frau-projiziert-3861969\/\">Pexels<\/a><\/p><\/div><\/p>\n<p>Once again this year, the Strategy and Organisation Working Group of the Association of <a href=\"https:\/\/www.zki.de\/english\/\">Centres for Communication and Information Processing<\/a> conducted a survey on the most important topics and trends of IT institutions from research institutions and universities in Germany. 85 institutions participated in this year&#8217;s survey, providing exciting insights into promising IT topics that will shape the year 2022.<\/p>\n<p>Are you wondering what the top trends and topics are and what you need to be prepared for in the IT world? Then you&#8217;ve come to the right place!<\/p>\n<p><!--more--><\/p>\n<p><strong>Top Trends &amp; Topics<\/strong><\/p>\n<p>The results of the core survey contain twelve consistent questions each year that provide promising insights into IT topics that are definitely worth keeping an eye on. We have compiled the most central points for you:<\/p>\n<p>Which top trends stand out in IT in general? In the top 3, <strong>IT security<\/strong> stands out in first place, followed by cloud offerings and <strong>machine learning<\/strong>. <strong>Mobile working<\/strong> and <strong>digitalisation<\/strong> have also joined the top 5 general IT trends.<\/p>\n<p>The fact that the topic of IT security plays a major role at RWTH Aachen University cannot be overlooked: for example, a <a href=\"https:\/\/blog.rwth-aachen.de\/itc\/en\/2022\/01\/10\/cyber-security-awareness-training\/\">cyber security awareness training<\/a> course was launched at the university in December last year to familiarise students and staff with the topic of <a href=\"https:\/\/blog.rwth-aachen.de\/itc\/en\/tag\/phishing\/\">phishing<\/a> and IT security in general &#8211; an important and central topic that the university is also dedicating itself to this year in order to ward off possible cyber attacks and get a feel for the right measures to take. Ever heard of <a href=\"https:\/\/blog.rwth-aachen.de\/itc\/en\/tag\/phishing\/\">vishing<\/a>? We have already addressed the issue and keep up with all the important developments in the IT world.<\/p>\n<p>In this year&#8217;s survey by the ZKI, the topic of <strong>IT security<\/strong> is generally considered to be the number one top trend, and this also applies to the question of which top trends are particularly relevant for the German higher education and research landscape.<\/p>\n<p>Here, <strong>cloud offerings<\/strong> secure second place. The topic of <a href=\"https:\/\/blog.rwth-aachen.de\/itc\/en\/2021\/06\/23\/fair-data-spaces\/\">cloud-based data space<\/a> or FAIR DATA Space, a digital space to be created for business and science, also turns out to be a mega-trend for the year 2022 and should definitely not be swept under the table \ud83d\ude09 Keep up to date on this on our <a href=\"https:\/\/blog.rwth-aachen.de\/itc\/en\/\">blog<\/a> as well.<\/p>\n<p>The issue of <strong>staff shortages<\/strong> is preoccupying universities nationwide and has earned itself a third place on the podium.<\/p>\n<p>Topics that are currently being strategically addressed at German universities are, in first place, <strong>IT Security<\/strong>, closely followed by <strong>Research Data Management<\/strong> and <strong>Digitisation<\/strong>. The topic of research data management remains very present in the German research landscape and represents a central issue. This is also the case for RWTH Aachen University: There are many places to go around the topic of research data, such as on the <a href=\"https:\/\/www.rwth-aachen.de\/cms\/root\/Forschung\/~lnaw\/Forschungsdatenmanagement\/?lidx=1\">RWTH websites<\/a> and the <a href=\"https:\/\/blog.rwth-aachen.de\/forschungsdaten\/en\/\">RDM blog<\/a>.<\/p>\n<p><strong>New technologies?<\/strong><\/p>\n<p>What new and increasingly relevant technology trends should we be prepared for this year? <strong>Multi-factor authentication<\/strong>, <strong>cloud<\/strong> and <strong>Docker containers<\/strong> are the top trends in the Top Trends survey. What exactly is meant by multi-factor authentication and why it contributes to more security, we have prepared on our <a href=\"https:\/\/blog.rwth-aachen.de\/itc\/en\/2021\/05\/05\/die-multi-faktor-authentifizierung\/\">blog<\/a>.<\/p>\n<p>In addition, services and technologies such as application management, <a href=\"https:\/\/www.his.de\/hisinone\">HISinOne<\/a> and collaboration solutions will play a significant role for universities in 2022.<\/p>\n<p>The survey offers even more promising insights: the complete analysis of the entire survey can be found on <a href=\"https:\/\/zenodo.org\/record\/6012936#.YiIiiXrMKUn\">Zenodo<\/a>.<\/p>\n<p>The fast-moving IT world and digitalisation require constant adjustment and reaction. We are curious to see how the topics and trends will continue to develop this year and keep our eyes and ears open. \ud83d\ude42<\/p>\n<p>&nbsp;<\/p>\n<p>Responsible for the content of this article is <a href=\"https:\/\/www.itc.rwth-aachen.de\/cms\/IT-Center\/IT-Center\/Team\/~epvp\/Mitarbeiter-CAMPUS-\/?gguid=0xCEBA260FD5AB124D808C372CCB23E8F2&amp;allou=1&amp;lidx=1\">Lina-Louise Kaulbach<\/a>.<\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Sorry, this entry is only available in Deutsch.<\/p>\n","protected":false},"author":3675,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"c2c_always_allow_admin_comments":false,"footnotes":""},"categories":[1574,313,314],"tags":[92,218,302,243,266,300,298,81,61,303,301,299,111,297],"class_list":["post-11131","post","type-post","status-publish","format-standard","hentry","category-fdm","category-interviews-umfragen","category-it-sicherheit","tag-cloud","tag-digitalisierung","tag-docker-container","tag-fair-data-spaces","tag-forschungsdatenmanagement","tag-hochschulen","tag-it","tag-it-security","tag-it-sicherheit","tag-multi-faktor-authentifizierung","tag-personalmangel","tag-top-trends","tag-umfrage","tag-zki"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/11131","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/users\/3675"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/comments?post=11131"}],"version-history":[{"count":13,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/11131\/revisions"}],"predecessor-version":[{"id":11158,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/11131\/revisions\/11158"}],"wp:attachment":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/media?parent=11131"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/categories?post=11131"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/tags?post=11131"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}