Atjaunināt sīkdatņu piekrišanu

E-grāmata: Technology Assessment of Dual-Use ICTs: How to Assess Diffusion, Governance and Design

  • Formāts: PDF+DRM
  • Izdošanas datums: 30-Jun-2023
  • Izdevniecība: Springer Vieweg
  • Valoda: eng
  • ISBN-13: 9783658416676
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 118,37 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Izdošanas datums: 30-Jun-2023
  • Izdevniecība: Springer Vieweg
  • Valoda: eng
  • ISBN-13: 9783658416676
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Information and Communication Technologies (ICTs) are important to human, national, and even international security. IT research, artifacts, and knowledge that can be applied in military and civilian contexts, used as part of weapon systems, or cause significant harm are referred to as dual-use. Advances in artificial intelligence (AI), robotics, cybersecurity, and open source intelligence (OSINT) raise questions about their dual-use risks. But how can dual-use of such disparate technologies be assessed? Case studies are still lacking on how to assess dual-use ICT and how to enable sensitive and responsible dual-use design. To address the research gap, this cumulative dissertation uses Technology Assessment (TA) as an epistemological framework to bring together approaches of Critical Security Studies (CSS) as well as Value Sensitive Design (VSD) from the field of Human-Computer Interaction (HCI). As a result, the dissertation systematizes the dual-use risks and scenarios of the selected ICTs and derives organizational and design implications.


Introduction.-  Theoretical Background and Related Work.-  Research
Design.-  Results.- Discussion.- Conclusion.- Measuring Spillover Effects
from Defense to Civilian Sectors: A Quantitative Approach Using
LinkedIn.- Dual-Use and Trustworthy? A Mixed Methods Analysis of AI Diffusion
between Civilian and Defense R&D.-  Meaningful Human Control of LAWS: The
CCW-Debate and its Implications for Value-Sensitive Design.- U.S. Security
Policy: The Dual-Use Regulation of Cryptography and its Effects on
Surveillance.- Values and Value Conflicts in the Context of OSINT
Technologies for Cybersecurity Incident Response.- Computer Emergency
Response Teams and the German Cyber Defense: An Analysis of CERTs on Federal
and State Level.- Privacy Concerns and Acceptance Factors of OSINT for
Cybersecurity: A Representative Survey.- CySecAlert: An Alert Generation
System for Cyber Security Events Using Open Source Intelligence
Data.- Bibliography.
About the author:Thea Riebe is a post-doctoral researcher at the Chair of Science and Technology for Peace and Security (PEASEC) in the Department of Computer Science at the TU Darmstadt. She did her interdisciplinary PhD on technology assessment of dual-use technologies in computer science, combining approaches from critical security research, and human-computer interaction.