000 04038nam a22004695i 4500
001 978-3-658-41667-6
003 DE-He213
005 20240423125547.0
007 cr nn 008mamaa
008 230630s2023 gw | s |||| 0|eng d
020 _a9783658416676
_9978-3-658-41667-6
024 7 _a10.1007/978-3-658-41667-6
_2doi
050 4 _aQ334-342
050 4 _aTA347.A78
072 7 _aUYQ
_2bicssc
072 7 _aCOM004000
_2bisacsh
072 7 _aUYQ
_2thema
082 0 4 _a006.3
_223
100 1 _aRiebe, Thea.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aTechnology Assessment of Dual-Use ICTs
_h[electronic resource] :
_bHow to Assess Diffusion, Governance and Design /
_cby Thea Riebe.
250 _a1st ed. 2023.
264 1 _aWiesbaden :
_bSpringer Fachmedien Wiesbaden :
_bImprint: Springer Vieweg,
_c2023.
300 _aXXV, 310 p. 36 illus. Textbook for German language market.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aIntroduction -- Theoretical Background and Related Work -- Research Design -- Results -- Discussion -- Conclusion -- Measuring Spillover Effects from Defense to Civilian Sectors: A Quantitative Approach Using LinkedIn -- Dual-Use and Trustworthy? A Mixed Methods Analysis of AI Diffusion between Civilian and Defense R&D -- Meaningful Human Control of LAWS: The CCW-Debate and its Implications for Value-Sensitive Design -- U.S. Security Policy: The Dual-Use Regulation of Cryptography and its Effects on Surveillance -- Values and Value Conflicts in the Context of OSINT Technologies for Cybersecurity Incident Response -- Computer Emergency Response Teams and the German Cyber Defense: An Analysis of CERTs on Federal and State Level -- Privacy Concerns and Acceptance Factors of OSINT for Cybersecurity: A Representative Survey -- CySecAlert: An Alert Generation System for Cyber Security Events Using Open Source Intelligence Data -- Bibliography.
520 _aInformation and Communication Technologies (ICTs) are important to human, national, and even international security. IT research, artifacts, and knowledge that can be applied in military and civilian contexts, used as part of weapon systems, or cause significant harm are referred to as dual-use. Advances in artificial intelligence (AI), robotics, cybersecurity, and open source intelligence (OSINT) raise questions about their dual-use risks. But how can dual-use of such disparate technologies be assessed? Case studies are still lacking on how to assess dual-use ICT and how to enable sensitive and responsible dual-use design. To address the research gap, this cumulative dissertation uses Technology Assessment (TA) as an epistemological framework to bring together approaches of Critical Security Studies (CSS) as well as Value Sensitive Design (VSD) from the field of Human-Computer Interaction (HCI). As a result, the dissertation systematizes the dual-use risks and scenarios of the selected ICTs and derives organizational and design implications. About the author: Thea Riebe is a post-doctoral researcher at the Chair of Science and Technology for Peace and Security (PEASEC) in the Department of Computer Science at the TU Darmstadt. She did her interdisciplinary PhD on technology assessment of dual-use technologies in computer science, combining approaches from critical security research, and human-computer interaction.
650 0 _aArtificial intelligence.
650 0 _aLogic programming.
650 1 4 _aArtificial Intelligence.
650 2 4 _aLogic in AI.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783658416669
776 0 8 _iPrinted edition:
_z9783658416683
856 4 0 _uhttps://doi.org/10.1007/978-3-658-41667-6
912 _aZDB-2-STI
942 _cSPRINGER
999 _c179286
_d179286