Technology Assessment of Dual-Use ICTs (Record no. 179286)

MARC details
000 -LEADER
fixed length control field 04038nam a22004695i 4500
001 - CONTROL NUMBER
control field 978-3-658-41667-6
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240423125547.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230630s2023 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783658416676
-- 978-3-658-41667-6
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-658-41667-6
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number Q334-342
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TA347.A78
072 #7 - SUBJECT CATEGORY CODE
Subject category code UYQ
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM004000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UYQ
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 006.3
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Riebe, Thea.
Relator term author.
Relator code aut
-- http://id.loc.gov/vocabulary/relators/aut
245 10 - TITLE STATEMENT
Title Technology Assessment of Dual-Use ICTs
Medium [electronic resource] :
Remainder of title How to Assess Diffusion, Governance and Design /
Statement of responsibility, etc by Thea Riebe.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2023.
264 #1 -
-- Wiesbaden :
-- Springer Fachmedien Wiesbaden :
-- Imprint: Springer Vieweg,
-- 2023.
300 ## - PHYSICAL DESCRIPTION
Extent XXV, 310 p. 36 illus. Textbook for German language market.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Introduction -- Theoretical Background and Related Work -- Research Design -- Results -- Discussion -- Conclusion -- Measuring Spillover Effects from Defense to Civilian Sectors: A Quantitative Approach Using LinkedIn -- Dual-Use and Trustworthy? A Mixed Methods Analysis of AI Diffusion between Civilian and Defense R&D -- Meaningful Human Control of LAWS: The CCW-Debate and its Implications for Value-Sensitive Design -- U.S. Security Policy: The Dual-Use Regulation of Cryptography and its Effects on Surveillance -- Values and Value Conflicts in the Context of OSINT Technologies for Cybersecurity Incident Response -- Computer Emergency Response Teams and the German Cyber Defense: An Analysis of CERTs on Federal and State Level -- Privacy Concerns and Acceptance Factors of OSINT for Cybersecurity: A Representative Survey -- CySecAlert: An Alert Generation System for Cyber Security Events Using Open Source Intelligence Data -- Bibliography.
520 ## - SUMMARY, ETC.
Summary, etc Information and Communication Technologies (ICTs) are important to human, national, and even international security. IT research, artifacts, and knowledge that can be applied in military and civilian contexts, used as part of weapon systems, or cause significant harm are referred to as dual-use. Advances in artificial intelligence (AI), robotics, cybersecurity, and open source intelligence (OSINT) raise questions about their dual-use risks. But how can dual-use of such disparate technologies be assessed? Case studies are still lacking on how to assess dual-use ICT and how to enable sensitive and responsible dual-use design. To address the research gap, this cumulative dissertation uses Technology Assessment (TA) as an epistemological framework to bring together approaches of Critical Security Studies (CSS) as well as Value Sensitive Design (VSD) from the field of Human-Computer Interaction (HCI). As a result, the dissertation systematizes the dual-use risks and scenarios of the selected ICTs and derives organizational and design implications. About the author: Thea Riebe is a post-doctoral researcher at the Chair of Science and Technology for Peace and Security (PEASEC) in the Department of Computer Science at the TU Darmstadt. She did her interdisciplinary PhD on technology assessment of dual-use technologies in computer science, combining approaches from critical security research, and human-computer interaction.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Artificial intelligence.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Logic programming.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Artificial Intelligence.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Logic in AI.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783658416669
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783658416683
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/978-3-658-41667-6">https://doi.org/10.1007/978-3-658-41667-6</a>
912 ## -
-- ZDB-2-STI
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks-CSE-Springer

No items available.

© 2024 IIIT-Delhi, library@iiitd.ac.in