Skip to main content

previous disabled Page of 2
and
  1. Article

    Open Access

    Values and Value Conflicts in the Context of OSINT Technologies for Cybersecurity Incident Response: A Value Sensitive Design Perspective

    The negotiation of stakeholder values as a collaborative process throughout technology development has been studied extensively within the fields of Computer Supported Cooperative Work and Human-Computer Inter...

    Thea Riebe, Julian Bäumler in Computer Supported Cooperative Work (CSCW) (2024)

  2. No Access

    Chapter

    Theoretical Background and Related Work

    This chapter introduces the domains and fields relevant to the thesis. First, as this dissertation contributes to computer science peace research, it introduces the field (Section 2.1). The field of CSS is introd...

    Thea Riebe in Technology Assessment of Dual-Use ICTs (2023)

  3. No Access

    Chapter

    Results

    This chapter provides a summary of the papers’ research results, map** them on the dual-use and underlying security concepts.

    Thea Riebe in Technology Assessment of Dual-Use ICTs (2023)

  4. No Access

    Chapter

    Conclusion

    The scientific discourse on dual-use has been driven by efforts for non-proliferation of nuclear, biological and chemical weapons, as well as by ethical and security concerns regarding threats by terrorism sin...

    Thea Riebe in Technology Assessment of Dual-Use ICTs (2023)

  5. No Access

    Chapter

    Measuring Spillover Effects from Defense to Civilian Sectors: A Quantitative Approach Using LinkedIn

    Spillover effects describe the process of a company benefiting from the R&D activities of another one and thereby gaining an economic advantage. One prominent approach for measuring spillover effects is based ...

    Thea Riebe in Technology Assessment of Dual-Use ICTs (2023)

  6. No Access

    Chapter

    Introduction

    In 2016, the American Academy of Arts and Sciences published a report on the Governance of dual-use technologies, in which the dual-use risks of Information and Communication Technology (ICT) were recognized.

    Thea Riebe in Technology Assessment of Dual-Use ICTs (2023)

  7. No Access

    Chapter

    Research Design

    This chapter presents the overall methodological foundations and the research design of this dissertation. Based on the epistemology and conceptual background of the field (Section 3.1), the research approach (Se...

    Thea Riebe in Technology Assessment of Dual-Use ICTs (2023)

  8. No Access

    Chapter

    Discussion

    The discussion is organized as follows: In Section 5.1 approaches for the monitoring of dual-use ICTs are discussed, while Section 5.2 reflects the results of dual-use governance ICTs.

    Thea Riebe in Technology Assessment of Dual-Use ICTs (2023)

  9. No Access

    Chapter

    List of the Author’s Publications

    In sum, 30 publications have been published in the context of the authors work. The publications are ranked according to the CORE and the Journal Impact Factor (JIF) The following 8 publications are published ...

    Thea Riebe in Technology Assessment of Dual-Use ICTs (2023)

  10. No Access

    Book

    Technology Assessment of Dual-Use ICTs

    How to Assess Diffusion, Governance and Design

    Thea Riebe (2023)

  11. No Access

    Chapter

    U.S. Security Policy: The Dual-Use Regulation of Cryptography and its Effects on Surveillance

    Cryptography has become ubiquitous in communication technology and is considered a necessary part of information security. However, the regulation to restrict the access to cryptography, as well as the practic...

    Thea Riebe in Technology Assessment of Dual-Use ICTs (2023)

  12. No Access

    Chapter

    Computer Emergency Response Teams and the German Cyber Defense: An Analysis of CERTs on Federal and State Level

    Besides the merits of increasing digitization and interconnectedness in private and professional spaces, critical infrastructures and societies are more and more exposed to cyberattacks. In order to enhance th...

    Thea Riebe in Technology Assessment of Dual-Use ICTs (2023)

  13. No Access

    Chapter

    CySecAlert: An Alert Generation System for Cyber Security Events Using Open Source Intelligence Data

    Receiving relevant information on possible cyber threats, attacks, and data breaches in a timely manner is crucial for early response. The social media platform Twitter hosts an active cyber security community...

    Thea Riebe in Technology Assessment of Dual-Use ICTs (2023)

  14. No Access

    Chapter

    Meaningful Human Control of LAWS: The CCW-Debate and its Implications for Value-Sensitive Design

    Regarding the discussion of lethal autonomous weapon systems (LAWS) in the expert forum of the Convention on Certain Conventional Weapons (CCW), the interpretation of crucial concepts such as autonomy and huma...

    Thea Riebe in Technology Assessment of Dual-Use ICTs (2023)

  15. No Access

    Chapter

    Values and Value Conflicts in the Context of OSINT Technologies for Cybersecurity Incident Response

    The negotiation of stakeholder values as a collaborative process throughout technology development has been studied extensively within the fields of Computer Supported Cooperative Work and Human-Computer Inter...

    Thea Riebe in Technology Assessment of Dual-Use ICTs (2023)

  16. No Access

    Chapter

    Privacy Concerns and Acceptance Factors of OSINT for Cybersecurity: A Representative Survey

    The use of Open Source Intelligence (OSINT) to monitor and detect cybersecurity threats is gaining popularity among many organizations. This is especially relevant to monitor cyber threats for critical and pub...

    Thea Riebe in Technology Assessment of Dual-Use ICTs (2023)

  17. No Access

    Chapter

    Dual-Use and Trustworthy? A Mixed Methods Analysis of AI Diffusion between Civilian and Defense R&D

    Artificial Intelligence (AI) seems to be impacting all industry sectors and becoming a motor for innovation. The diffusion of AI from the civilian sector into the defense sector and the associated dual-use pot...

    Thea Riebe in Technology Assessment of Dual-Use ICTs (2023)

  18. Article

    Open Access

    Zur Schnittmenge von Informatik mit Friedens- und Sicherheitsforschung: Erfahrungen aus der interdisziplinären Lehre in der Friedensinformatik

    Interdisziplinäre Forschung und Lehre zwischen Informatik sowie Friedens- und Sicherheitsforschung ist vor dem Hintergrund der Bedeutung möglicher Konflikte im Cyberspace unabdingbar. Auch wenn sowohl in der e...

    Christian Reuter, Thea Riebe in Zeitschrift für Friedens- und Konfliktfors… (2022)

  19. Article

    Open Access

    U.S. Security Policy: The Dual-Use Regulation of Cryptography and its Effects on Surveillance

    Cryptography has become ubiquitous in communication technology and is considered a necessary part of information security. However, both the regulation to restrict access to cryptography, as well as practices ...

    Thea Riebe, Philipp Kühn, Philipp Imperatori in European Journal for Security Research (2022)

  20. Article

    Open Access

    Dual-Use and Trustworthy? A Mixed Methods Analysis of AI Diffusion Between Civilian and Defense R&D

    Artificial Intelligence (AI) seems to be impacting all industry sectors, while becoming a motor for innovation. The diffusion of AI from the civilian sector to the defense sector, and AI’s dual-use potential h...

    Stefka Schmid, Thea Riebe, Christian Reuter in Science and Engineering Ethics (2022)

previous disabled Page of 2