Abstract
Dual-use in information technology is a pressing issue: how can we prevent, control or manage the risk of a harmful application of IT? How can dual-use awareness and regulation help to mitigate the risks to peace and security on the national and international level? As the cyberspace has been declared a military domain, IT is of increasing importance for civil and military infrastructures. How can researchers, developers and decision makers make sure that IT is not misused to cause harm? For nuclear, biological and chemical technologies this has been discussed as the dual-use problem. This chapter illustrates the approaches towards different dual-use concepts, how to conduct a technology assessment and provides insight into the implementation of dual-use assessment guidelines at TU Darmstadt, the so-called Civil Clause.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Recommended Reading
Forge, J. (2010). A note on the definition of “dual use.” Science and Engineering Ethics, 16(1), 111–118. https://doi.org/10.1007/s11948-009-9159-9.
Lin, H. (2016). Governance of Information Technology and Cyber Weapons. In E. D. Harris (Ed.), Governance of Dual use Technologies: Theorie and Practice (pp. 112–157). American Academy of Arts & Sciences.
Bibliography
Adamsky, D. (2010). The Culture of Military Innovation: The Impact of Cultural Factors on the Revolution in Military Affairs in Russia, the US, and Israel. Stanford: Stanford University Press.
Alavi, H., & Khamichonak, T. (2017). EU and US export control regimes for dual use goods: An overview of existing frameworks. Romanian Journal of European Affairs, 17(1), 59–74.
Bezuidenhout, L. (2013). Data Sharing and Dual-Use Issues. Science and Engineering Ethics, 19(1), 83–92. https://doi.org/10.1007/s11948-011-9298-7.
Buchanan, B. (2016). The Cybersecurity Dilemma. London: C. Hurst & Co.
Capurro, R. (2017). Homo Digitalis: Beiträge zur Ontologie, Anthropologie und Ethik der digitalen Technik. Wiesbaden: Springer VS.
Carr, J. (2013). The misunderstood acronym: Why cyber weapons aren’t WMD. Bulletin of the Atomic Scientists, 69(5), 32–37. https://doi.org/10.1177/0096340213501373.
Collingridge, D. (1980). The social control of technology. New York: St. Martins Press.
DFG, & Leopoldina. Scientific Freedom and Scientific Responsibility: Recommendations for Handling Security-Relevant Research (2014). Retrieved from https://www.leopoldina.org/uploads/tx_leopublication/2014_06_DFG-Leopoldina_Scientific_Freedom_Responsibility_EN.pdf.
Drew, T. W., & Mueller-Doblies, U. U. (2017). Dual use issues in research – A subject of increasing concern? Vaccine, 35(44), 5990–5994. https://doi.org/10.1016/j.vaccine.2017.07.109.
European Commission. (2018a). Dual-use export controls. Retrieved from http://ec.europa.eu/trade/import-and-export-rules/export-from-eu/dual-use-controls/.
European Commission. (2018b). Guidance Note - Research involving dual-use items. Brussels. Retrieved from http://ec.europa.eu/research/participants/data/ref/h2020/other/hi/guide_research-dualuse_en.pdf.
European Commission. (2018c). Horizon 2020 Programme - Guidance How to complete your ethics self-assessment. Brussels. Retrieved from http://ec.europa.eu/research/participants/data/ref/h2020/grants_manual/hi/ethics/h2020_hi_ethics-self-assess_en.pdf.
Forge, J. (2010). A note on the definition of “dual use.” Science and Engineering Ethics, 16(1), 111–118. https://doi.org/10.1007/s11948-009-9159-9.
Gehring, P. (2015). Zivilklausel der TU Darmstadt - nun auch einvernehmliche Entscheidung für ein Umsetzungverfahren. Hoch 3.
Gehring, P. (2018, June). Die Zivilklausel der TU Darmstadt und das Verfahren zu ihrer Umsetzung. Darmstadt.
Grunwald, A. (2002). Technikfolgenabschätzung - Eine Einführung. Berlin: Edition Sigma.
Grunwald, A. (2011). Responsible Innovation: Bringing together Technology Assessment, Applied Ethics, and STS research. Enterprise and Work Innovation Studies, 31, 10.
Habermas, J. (1970). Toward a rational society. Boston: Beacon Press.
Harris, E. D. (Ed.). (2016). Governance of Dual-Use Technologies: Theory and Practice. Cambridge MA: American Academy of Arts & Sciences.
Herz, J. (1959). Political Realism and Political Idealism. Chicago: Chicago University Press.
Hubig, C. (2012). Zivilklausel an Universitäten. Forschung & Lehre, (October).
Hummel, H. (2017). Zivilklausel auf japanisch: Japanische Universitäten ächten Militärforschung. Wissenschaft & Frieden, (2).
Jervis, R. (1976). Persecption and misperception in international politics. Princeton: Princeton University Press.
Jonas, H. (1980). Das Prinzip Verantwortung: Versuch einer Ethik für die technologische Zivilisation. Frankfurt a.M.: Insel-Verlag.
Knappmeier, N. (2004). Das Wesen der Informatik … Was ist das Wesen der Informatik? Beispiel: RFID Toller Fortschritt ! Fazit. Inforz (Vol. 1). Darmstadt.
Knezo, G. J. (2005). Technology Assessment in Congress : History and Legislative Options. Washington D.C.: Congressional Research Service. Retrieved from http://congressionalresearch.com/RS21586/document.php
Leng, C. (2013). Die dunkle Seite: Informatik als Dual-Use-Technologie. Retrieved from https://link.springer.com/content/pdf/10.1007%2Fs00287-012-0675-7.pdf.
Liebert, W. (2011). Wissenschaft und gesellschaftliche Verantwortung. In M. Eger, B. Gondani, & R. Kröger (Eds.), Verantwortungsvolle Hochschuldidaktik (pp. 15–34). Berlin: Lit.
Liebert, W. (2013). Dual-use-Forschung und -Technologie. In A. Grunwald & M. Simonidis-Puschmann (Eds.), Handbuch Technikethik (pp. 243–244). Wiesbaden: Springer Verlag.
Liebert, W., & Schmidt, J. C. (2010). Towards a prospective technology assessment: Challenges and requirements for technology assessment in the age of technoscience. Poiesis Und Praxis, 7(1), 99–116. https://doi.org/10.1007/s10202-010-0079-1.
Lin, H. (2016a). Attribution of Malicious Cyber Incidents: From Soup to Nuts. Journal of International Affairs, 70(1), 56–137.
Lin, H. (2016b). Governance of Information Technology and Cyber Weapons. In E. D. Harris (Ed.), Governance of Dual-Use Technologies: Theorie and Practice (pp. 112–157). American Academy of Arts & Sciences.
Lösch, A., Gammel, S., & Nordmann, A. (2008). Observieren – Sondieren – Regulieren: Zur gesellschaftlichen Einbettung nanotechnologischer Entwicklungsprozesse. Darmstadt. Retrieved from https://www.philosophie.tu-darmstadt.de/media/philosophie_nanobuero/pdf_2/observierensondierenregulieren.pdf.
Meinrath, S. D., & Vitka, S. (2014). Crypto War II. Critical Studies in Media Communication, 31(2), 123–128. https://doi.org/10.1080/15295036.2014.921320.
Müller, H. (2017). Challanges of Control. In EU Non-Proliferation Consortium ELearning. Retrieved from https://nonproliferation-elearning.eu/learningunits/arms-control-basics/transcripts/LU01_VL2.pdf.
NATO. Warsaw Summit Communiqué (2016). Retrieved from https://www.nato.int/cps/en/natohq/official_texts_133169.htm.
Neuneck, G. (2013). Assessment of International and Regional Organizations and Activities. In J. A. Lewis & G. Neuneck (Eds.), The Cyber Index - International Security Trends and Realities (pp. 91–109). Geneva: UNIDIR.
Nielebock, T., Meisch, S., & Harms, V. (Eds.). (2012). Zivilklauseln für Forschung, Lehre und Studium: Hochschulen zum Frieden verpflichten. Baden-Baden: Nomos.
Nordmann, A. (2007). Entflechtung – Ansätze zum ethisch-gesellschaftlichen Umgang mit der Nanotechnologie. In A. Gazsó, S. Greßler, & F. Schiemer (Eds.), nano – Chancen und Risiken aktueller Technologien (pp. 215–229). Berlin: Springer.
Nordmann, A. (2018). Four Horsemen and a Rotten Apple: On the Technological Rationality of Nuclear Security. In A. Friedrich, P. Gehring, C. Hubig, A. Kaminski, & A. Nordmann (Eds.), Jahrbuch Technikphilosophie 2018 (pp. 283-297283–297). Nomos.
Oltmann, S. (2015). Dual use research: investigation across multiple science disciplines. Science and Engineering Ethics, 21(2), 327–341. https://doi.org/10.1007/s11948-014-9535-y.
OpenTA. (2018). NTA-Mitglieder. Retrieved from https://www.openta.net/mitglieder.
Owen, R., Macnaghten, P., & Stilgoe, J. (2012). Responsible research and innovation: From science in society to science for society, with society. Science and Public Policy, 39(6), 751–760. https://doi.org/10.1093/scipol/scs093.
Pyetranker, I. (2015). An Umbrella in a Hurricane: Cyber Technology and the December 2013 Amendment to the Wassenaar Agreement. Northwestern Journal of Technology and Intellectual Property, 13(2), 153–180.
Resnik, D. B. (2009). What is “Dual Use” Research? A Response to Miller and Selgelid. Science and Engineering Ethics, 15(1), 3–5. https://doi.org/10.1007/s11948-008-9104-3.
Statista. (2018). Anzahl der Hochschulen in Deutschland in den Wintersemestern 2013/2014 bis 2017/2018 nach Hochschulart.
TAB. (2014). TA at the German Bundestag A brief history of the Office of Technology Assessment at the German Bundestag (TAB). Retrieved from http://www.tab-beim-bundestag.de/en/about-tab/history.html.
TU Darmstadt. (2018). The Zivilklausel of TU Darmstadt. Retrieved from https://www.intern.tu-darmstadt.de/gremien/ethikkommisson/zivilklausel/zivilklausel.en.jsp.
Tucker, J. B. (Ed.). (2012). Innovation, Dual Use, Security: Managing The Risks of Emerging Biological and Chemical Technologies. Cambridge MA: MIT Press.
US National Research Council. (2006). Globalization, Biosecurity and the Future of the Life Sciences. Washington D.C. Retrieved from https://doi.org/10.17226/11567.
US Office of Export Control Cooperation; Bureau of International Security and Nonproliferation. (2018). Common Dual-Use and Military Control Lists of the EU.
von Massenbach, F. (2018). Initiative Hochschulen für den Frieden - Ja zur Zivilklausel. Retrieved from http://zivilklausel.de/index.php/impressum.
von Schomberg, R. (2006). The Precautionary Principle and Its Normative Challenges. In E. Fischer, J. Jones, & R. von Schomberg (Eds.), Implementing the Precautionary Principle: Perspectives and Prospects (pp. 19–42). Edward Elgar: Cheltenham.
von Schomberg, R. (2011). Introduction. In R. von Schomberg (Ed.), Towards Responsible Research and Innovation in the Information and Communication Technologies and Security Technologies Fields (pp. 7–16). European Commission. Retrieved from http://ec.europa.eu/research/science-society/document_library/pdf_06/mep-rapport-2011_en.pdf.
Wassenaar Arrangement Secretariat. (1996). The Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies, (10). Retrieved from http://www.wassenaar.org.
WHO. (2018). Dual Use Research of Concern (DURC). Retrieved from https://www.who.int/csr/durc/en/.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Fachmedien Wiesbaden GmbH, ein Teil von Springer Nature
About this chapter
Cite this chapter
Riebe, T., Reuter, C. (2019). Dual-Use and Dilemmas for Cybersecurity, Peace and Technology Assessment. In: Reuter, C. (eds) Information Technology for Peace and Security. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-25652-4_8
Download citation
DOI: https://doi.org/10.1007/978-3-658-25652-4_8
Published:
Publisher Name: Springer Vieweg, Wiesbaden
Print ISBN: 978-3-658-25651-7
Online ISBN: 978-3-658-25652-4
eBook Packages: Computer Science and Engineering (German Language)