Technology Assessment of Dual-Use ICTs : How to Assess Diffusion, Governance and Design

個数:

Technology Assessment of Dual-Use ICTs : How to Assess Diffusion, Governance and Design

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 310 p.
  • 商品コード 9783658416669

Full Description

Information and Communication Technologies (ICTs) are important to human, national, and even international security. IT research, artifacts, and knowledge that can be applied in military and civilian contexts, used as part of weapon systems, or cause significant harm are referred to as dual-use. Advances in artificial intelligence (AI), robotics, cybersecurity, and open source intelligence (OSINT) raise questions about their dual-use risks. But how can dual-use of such disparate technologies be assessed? Case studies are still lacking on how to assess dual-use ICT and how to enable sensitive and responsible dual-use design. To address the research gap, this cumulative dissertation uses Technology Assessment (TA) as an epistemological framework to bring together approaches of Critical Security Studies (CSS) as well as Value Sensitive Design (VSD) from the field of Human-Computer Interaction (HCI). As a result, the dissertation systematizes the dual-use risks and scenarios of the selected ICTs and derives organizational and design implications.

Contents

Introduction.-  Theoretical Background and Related Work.-  Research Design.-  Results.- Discussion.- Conclusion.- Measuring Spillover Effects from Defense to Civilian Sectors: A Quantitative Approach Using LinkedIn.- Dual-Use and Trustworthy? A Mixed Methods Analysis of AI Diffusion between Civilian and Defense R&D.-  Meaningful Human Control of LAWS: The CCW-Debate and its Implications for Value-Sensitive Design.- U.S. Security Policy: The Dual-Use Regulation of Cryptography and its Effects on Surveillance.- Values and Value Conflicts in the Context of OSINT Technologies for Cybersecurity Incident Response.- Computer Emergency Response Teams and the German Cyber Defense: An Analysis of CERTs on Federal and State Level.- Privacy Concerns and Acceptance Factors of OSINT for Cybersecurity: A Representative Survey.- CySecAlert: An Alert Generation System for Cyber Security Events Using Open Source Intelligence Data.- Bibliography.

最近チェックした商品