logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Technology Assessment Of Dualuse Icts How To Assess Diffusion Governance And Design Thea Riebe

  • SKU: BELL-50699434
Technology Assessment Of Dualuse Icts How To Assess Diffusion Governance And Design Thea Riebe
$ 31.00 $ 45.00 (-31%)

4.7

26 reviews

Technology Assessment Of Dualuse Icts How To Assess Diffusion Governance And Design Thea Riebe instant download after payment.

Publisher: Springer Vieweg
File Extension: PDF
File size: 5.08 MB
Pages: 325
Author: Thea Riebe
ISBN: 9783658416669, 3658416661
Language: English
Year: 2023

Product desciption

Technology Assessment Of Dualuse Icts How To Assess Diffusion Governance And Design Thea Riebe by Thea Riebe 9783658416669, 3658416661 instant download after payment.

Information and Communication Technologies (ICTs) are important to human, national, and even international security. IT research, artifacts, and knowledge that can be applied in military and civilian contexts, used as part of weapon systems, or cause significant harm are referred to as dual-use. Advances in artificial intelligence (AI), robotics, cybersecurity, and open source intelligence (OSINT) raise questions about their dual-use risks. But how can dual-use of such disparate technologies be assessed? Case studies are still lacking on how to assess dual-use ICT and how to enable sensitive and responsible dual-use design. To address the research gap, this cumulative dissertation uses Technology Assessment (TA) as an epistemological framework to bring together approaches of Critical Security Studies (CSS) as well as Value Sensitive Design (VSD) from the field of Human-Computer Interaction (HCI). As a result, the dissertation systematizes the dual-use risks and scenarios of the selected ICTs and derives organizational and design implications.

Related Products