Skip to main content

previous disabled Page of 2
and
  1. Article

    Open Access

    Values and Value Conflicts in the Context of OSINT Technologies for Cybersecurity Incident Response: A Value Sensitive Design Perspective

    The negotiation of stakeholder values as a collaborative process throughout technology development has been studied extensively within the fields of Computer Supported Cooperative Work and Human-Computer Inter...

    Thea Riebe, Julian Bäumler in Computer Supported Cooperative Work (CSCW) (2024)

  2. No Access

    Chapter

    Theoretical Background and Related Work

    This chapter introduces the domains and fields relevant to the thesis. First, as this dissertation contributes to computer science peace research, it introduces the field (Section 2.1). The field of CSS is introd...

    Thea Riebe in Technology Assessment of Dual-Use ICTs (2023)

  3. No Access

    Chapter

    Results

    This chapter provides a summary of the papers’ research results, map** them on the dual-use and underlying security concepts.

    Thea Riebe in Technology Assessment of Dual-Use ICTs (2023)

  4. No Access

    Chapter

    Conclusion

    The scientific discourse on dual-use has been driven by efforts for non-proliferation of nuclear, biological and chemical weapons, as well as by ethical and security concerns regarding threats by terrorism sin...

    Thea Riebe in Technology Assessment of Dual-Use ICTs (2023)

  5. No Access

    Chapter

    Measuring Spillover Effects from Defense to Civilian Sectors: A Quantitative Approach Using LinkedIn

    Spillover effects describe the process of a company benefiting from the R&D activities of another one and thereby gaining an economic advantage. One prominent approach for measuring spillover effects is based ...

    Thea Riebe in Technology Assessment of Dual-Use ICTs (2023)

  6. No Access

    Chapter

    Introduction

    In 2016, the American Academy of Arts and Sciences published a report on the Governance of dual-use technologies, in which the dual-use risks of Information and Communication Technology (ICT) were recognized.

    Thea Riebe in Technology Assessment of Dual-Use ICTs (2023)

  7. No Access

    Chapter

    Research Design

    This chapter presents the overall methodological foundations and the research design of this dissertation. Based on the epistemology and conceptual background of the field (Section 3.1), the research approach (Se...

    Thea Riebe in Technology Assessment of Dual-Use ICTs (2023)

  8. No Access

    Chapter

    Discussion

    The discussion is organized as follows: In Section 5.1 approaches for the monitoring of dual-use ICTs are discussed, while Section 5.2 reflects the results of dual-use governance ICTs.

    Thea Riebe in Technology Assessment of Dual-Use ICTs (2023)

  9. No Access

    Chapter

    List of the Author’s Publications

    In sum, 30 publications have been published in the context of the authors work. The publications are ranked according to the CORE and the Journal Impact Factor (JIF) The following 8 publications are published ...

    Thea Riebe in Technology Assessment of Dual-Use ICTs (2023)

  10. No Access

    Book

    Technology Assessment of Dual-Use ICTs

    How to Assess Diffusion, Governance and Design

    Thea Riebe (2023)

  11. No Access

    Chapter

    U.S. Security Policy: The Dual-Use Regulation of Cryptography and its Effects on Surveillance

    Cryptography has become ubiquitous in communication technology and is considered a necessary part of information security. However, the regulation to restrict the access to cryptography, as well as the practic...

    Thea Riebe in Technology Assessment of Dual-Use ICTs (2023)

  12. No Access

    Chapter

    Computer Emergency Response Teams and the German Cyber Defense: An Analysis of CERTs on Federal and State Level

    Besides the merits of increasing digitization and interconnectedness in private and professional spaces, critical infrastructures and societies are more and more exposed to cyberattacks. In order to enhance th...

    Thea Riebe in Technology Assessment of Dual-Use ICTs (2023)

  13. No Access

    Chapter

    CySecAlert: An Alert Generation System for Cyber Security Events Using Open Source Intelligence Data

    Receiving relevant information on possible cyber threats, attacks, and data breaches in a timely manner is crucial for early response. The social media platform Twitter hosts an active cyber security community...

    Thea Riebe in Technology Assessment of Dual-Use ICTs (2023)

  14. No Access

    Chapter

    Meaningful Human Control of LAWS: The CCW-Debate and its Implications for Value-Sensitive Design

    Regarding the discussion of lethal autonomous weapon systems (LAWS) in the expert forum of the Convention on Certain Conventional Weapons (CCW), the interpretation of crucial concepts such as autonomy and huma...

    Thea Riebe in Technology Assessment of Dual-Use ICTs (2023)

  15. No Access

    Chapter

    Values and Value Conflicts in the Context of OSINT Technologies for Cybersecurity Incident Response

    The negotiation of stakeholder values as a collaborative process throughout technology development has been studied extensively within the fields of Computer Supported Cooperative Work and Human-Computer Inter...

    Thea Riebe in Technology Assessment of Dual-Use ICTs (2023)

  16. No Access

    Chapter

    Privacy Concerns and Acceptance Factors of OSINT for Cybersecurity: A Representative Survey

    The use of Open Source Intelligence (OSINT) to monitor and detect cybersecurity threats is gaining popularity among many organizations. This is especially relevant to monitor cyber threats for critical and pub...

    Thea Riebe in Technology Assessment of Dual-Use ICTs (2023)

  17. No Access

    Chapter

    Dual-Use and Trustworthy? A Mixed Methods Analysis of AI Diffusion between Civilian and Defense R&D

    Artificial Intelligence (AI) seems to be impacting all industry sectors and becoming a motor for innovation. The diffusion of AI from the civilian sector into the defense sector and the associated dual-use pot...

    Thea Riebe in Technology Assessment of Dual-Use ICTs (2023)

  18. No Access

    Chapter and Conference Paper

    CySecAlert: An Alert Generation System for Cyber Security Events Using Open Source Intelligence Data

    Receiving relevant information on possible cyber threats, attacks, and data breaches in a timely manner is crucial for early response. The social media platform Twitter hosts an active cyber security community...

    Thea Riebe, Tristan Wirth, Markus Bayer in Information and Communications Security (2021)

  19. No Access

    Article

    Die Vorratsdatenspeicherung in Europa

    Die Diskussion um die Vorratsdatenspeicherung ist europaweit weiterhin relevant, da es keine einheitliche Gesetzgebung der EU-Mitgliedsstaaten gibt. So werden in einigen EU-Staaten weiterhin Vorratsdaten gespe...

    Thea Riebe, Jasmin Haunschild, Felix Divo in Datenschutz und Datensicherheit - DuD (2020)

  20. No Access

    Chapter

    The Future of IT in Peace and Security

    Not only today, but also in the future information technology and the advances in the field of computer science will have a high relevance for peace and security. Naturally, a textbook like this can only cover...

    Christian Reuter, Konstantin Aal in Information Technology for Peace and Secur… (2019)

previous disabled Page of 2