Technology Assessment of Dual-Use ICTs
How to Assess Diffusion, Governance and Design
Article
The negotiation of stakeholder values as a collaborative process throughout technology development has been studied extensively within the fields of Computer Supported Cooperative Work and Human-Computer Inter...
Chapter
This chapter introduces the domains and fields relevant to the thesis. First, as this dissertation contributes to computer science peace research, it introduces the field (Section 2.1). The field of CSS is introd...
Chapter
This chapter provides a summary of the papers’ research results, map** them on the dual-use and underlying security concepts.
Chapter
The scientific discourse on dual-use has been driven by efforts for non-proliferation of nuclear, biological and chemical weapons, as well as by ethical and security concerns regarding threats by terrorism sin...
Chapter
Spillover effects describe the process of a company benefiting from the R&D activities of another one and thereby gaining an economic advantage. One prominent approach for measuring spillover effects is based ...
Chapter
In 2016, the American Academy of Arts and Sciences published a report on the Governance of dual-use technologies, in which the dual-use risks of Information and Communication Technology (ICT) were recognized.
Chapter
This chapter presents the overall methodological foundations and the research design of this dissertation. Based on the epistemology and conceptual background of the field (Section 3.1), the research approach (Se...
Chapter
The discussion is organized as follows: In Section 5.1 approaches for the monitoring of dual-use ICTs are discussed, while Section 5.2 reflects the results of dual-use governance ICTs.
Chapter
In sum, 30 publications have been published in the context of the authors work. The publications are ranked according to the CORE and the Journal Impact Factor (JIF) The following 8 publications are published ...
Book
Chapter
Cryptography has become ubiquitous in communication technology and is considered a necessary part of information security. However, the regulation to restrict the access to cryptography, as well as the practic...
Chapter
Besides the merits of increasing digitization and interconnectedness in private and professional spaces, critical infrastructures and societies are more and more exposed to cyberattacks. In order to enhance th...
Chapter
Receiving relevant information on possible cyber threats, attacks, and data breaches in a timely manner is crucial for early response. The social media platform Twitter hosts an active cyber security community...
Chapter
Regarding the discussion of lethal autonomous weapon systems (LAWS) in the expert forum of the Convention on Certain Conventional Weapons (CCW), the interpretation of crucial concepts such as autonomy and huma...
Chapter
The negotiation of stakeholder values as a collaborative process throughout technology development has been studied extensively within the fields of Computer Supported Cooperative Work and Human-Computer Inter...
Chapter
The use of Open Source Intelligence (OSINT) to monitor and detect cybersecurity threats is gaining popularity among many organizations. This is especially relevant to monitor cyber threats for critical and pub...
Chapter
Artificial Intelligence (AI) seems to be impacting all industry sectors and becoming a motor for innovation. The diffusion of AI from the civilian sector into the defense sector and the associated dual-use pot...
Article
Interdisziplinäre Forschung und Lehre zwischen Informatik sowie Friedens- und Sicherheitsforschung ist vor dem Hintergrund der Bedeutung möglicher Konflikte im Cyberspace unabdingbar. Auch wenn sowohl in der e...
Article
Cryptography has become ubiquitous in communication technology and is considered a necessary part of information security. However, both the regulation to restrict access to cryptography, as well as practices ...
Article
Artificial Intelligence (AI) seems to be impacting all industry sectors, while becoming a motor for innovation. The diffusion of AI from the civilian sector to the defense sector, and AI’s dual-use potential h...