Advertisement

IT in Peace, Conflict, and Security Research

  • Christian ReuterEmail author
  • Larissa Aldehoff
  • Thea Riebe
  • Marc-André Kaufhold
Chapter

Abstract

Advances in science and technology play a crucial role in the context of peace, conflict and security. As information technology (IT) is becoming omnipresent, this includes both the resilience of IT infrastructures e.g. as a target in cases of conflict and the role of IT applications to prevent and manage conflicts, crises and disasters. This chapter is an introduction to IT and its role in war and peace, in conflicts and crises as well as in safety and security. Based on those connections a new field of research has emerged: IT peace research. It is introduced in this chapter which provides an overview of the interdisciplinary concepts of peace, conflict and security. In addition, the research disciplines computer science and peace and conflict studies as the basis of IT peace research are explained. Moreover, the chapter focuses on the specific research topics of IT peace research and presents the institutionalised research landscape in Germany.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

Recommended Reading

  1. Altmann, J. (2017). Einführung. In J. Altmann, U. Bernhardt, K. Nixdorff, I. Ruhmann, & D. Wöhrle (Eds.), Naturwissenschaft – Rüstung – Frieden. Basiswissen für die Friedensforschung (pp. 1–7). Wiesbaden: Springer VS.Google Scholar

Bibliography

  1. Altmann, J. (2017). Einführung. In J. Altmann, U. Bernhardt, K. Nixdorff, I. Ruhmann, & D. Wöhrle (Eds.), Naturwissenschaft – Rüstung – Frieden. Basiswissen für die Friedensforschung (pp. 1–7). Wiesbaden: Springer VS.Google Scholar
  2. Altmann, J., Kalinowski, M., Kronfeld-Goharani, U., Liebert, W., & Neuneck, G. (2010). Naturwissenschaft, Krieg und Frieden. In P. Schlotter & S. Wisotzki (Eds.), Friedens- und Konfliktforschung (pp. 410–445). Baden-Baden: Nomos.  https://doi.org/10.1007/978-3-531-92009-2
  3. Altmann, J., & Sauer, F. (2017). Autonomous Weapon Systems and Strategic Stability. Survival: Global Politics and Strategy, 59(5), 117–142.  https://doi.org/10.1080/00396338.2017.1375263
  4. Alwardt, C., Brzoska, M., Ehrhart, H.-G., Kahl, M., Neuneck, G., Schmid, J., & Schneider, P. (2013). Braucht Deutschland Kampfdrohnen? Hamburger Informationen Zur Friedensforschung Und Sicherheitspolitik, 50, 1–12.Google Scholar
  5. Arquilla, J., & Ronfeldt, D. (1993). Cyberwar is Coming. RAND Corporation.Google Scholar
  6. Bernhardt, U., & Ruhmann, I. (2017). Informatik. In J. Altmann, U. Bernhardt, K. Nixdorff, I. Ruhmann, & D. Wöhrle (Eds.), Naturwissenschaft – Rüstung – Frieden (pp. 337–448).  https://doi.org/10.1007/978-3-658-01974-7
  7. BMVg. (2016). Abschlussbericht Aufbaustab Cyber- und Informationsraum. http://docs.dpaq.de/11361-abschlussbericht_aufbaustab_cir.pdf
  8. Bonacker, T. (2011). Forschung für oder Forschung über den Frieden? Zum Selbstverständnis der Friedens-und Konfliktforschung. In P. Schlotter & S. Wisotzki (Eds.), Friedens- und Konfliktforschung (pp. 46–78). Baden-Baden: Nomos.Google Scholar
  9. Booth, K. (2014). Global Security. In M. Kaldor & I. Rangelov (Eds.), The Handbook of Global Security Policy (pp. 11–30). Wiley.Google Scholar
  10. Boulanin, V., & Verbruggen, M. (2017). Mapping the development of autonomy in weapon systems.  https://doi.org/10.13140/RG.2.2.22719.41127
  11. Boulding, K. E. (1963). Is Peace Researchable? Background, 6(4), 70–77.Google Scholar
  12. Bovet, A., & Makse, H. A. (2019). Influence of fake news in Twitter during the 2016 US presidential election. Nature Communications, 10(7), 1–23.Google Scholar
  13. Buchanan, B. (2016). The Cybersecurity Dilemma. London: C. Hurst & Co.Google Scholar
  14. Bundesamt für Sicherheit in der Informationstechnik. (2013). IT-Grundschutz: Glossar und Begriffsdefinitionen. Retrieved from https://www.bsi.bund.de/DE/Themen/ITGrundschutz/ITGrundschutzKataloge/Inhalt/Glossar/glossar_node.html
  15. Bundesamt für Sicherheit in der Informationstechnik. (2016). Die Lage der IT-Sicherheit in Deutschland 2016. https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/Lageberichte/Lagebericht2016.pdf?__blob=publicationFile&v=5
  16. Bundesamt für Sicherheit in der Informationstechnik. (2017). Cyber-Sicherheit. Retrieved from https://www.bsi.bund.de/DE/Themen/Cyber-Sicherheit/cyber-sicherheit_node.html
  17. Campbell, P. J., MacKinnon, A. S., & Stevens, C. (2010). An Introduction to Global Studies. Wiley-Blackwell.Google Scholar
  18. Caughley, T. (2016). Nuclear Disarmament Verification: Survey of Verification Mechanisms. http://www.unidir.org/files/publications/pdfs/survey-of-verification-mechanisms-en-657.pdf
  19. Chivvis, C. S., & Dion-Schwarz, C. (2017). Why It’s So Hard to Stop a Cyberattack - and Even Harder to Fight Back. https://www.rand.org/blog/2017/03/why-its-so-hard-to-stop-a-cyberattack-and-evenharder.html
  20. Davis, J. S. I., Boudreaux, B., Welburn, J. W., Ogletree, C., McGovern, G., & Chase, M. S. (2017). Stateless Attribution: Toward International Accountability in Cyberspace. RAND CorporationGoogle Scholar
  21. Deutscher Bundestag. (2017). Fake-News: Definition und Rechtslage. https://www.bundestag.de/blob/502158/99feb7f3b7fd1721ab4ea631d8779247/wd-10-003-17-pdf-data.pdf
  22. Federal Ministry of the Interior. (2011). Cyber Security Strategy for Germany. Retrieved from https://www.cio.bund.de/SharedDocs/Publikationen/DE/Strategische-Themen/css_engl_download.pdf?__blob=publicationFile
  23. Federath, H. (2017). Einführung in die IT-Sicherheit. Retrieved from https://svs.informatik.uni-hamburg.de/teaching/gss-10einfsi.pdf
  24. Ferrara, E., Varol, O., Davis, C., Menczer, F., & Flammini, A. (2016). The Rise of Social Bots. Communications of the ACM, 59(7), 96–104.Google Scholar
  25. FIfF. (n.d.). Forum InformatikerInnen für Frieden und gesellschaftliche Verantwortung e.V. - Wir über uns. https://www.fiff.de/about
  26. FONAS. (n.d.). Forschungsverbund Naturwissenschaft, Abrüstung und internationale Sicherheit. http://www.fonas.org/fonas/kurzbeschreibung/
  27. FONAS. (2015). Forschungsmemorandum - Naturwissenschaftliche Friedensforschung in Deutschland - Eine neue Förderinitiative ist dringend nötig. Retrieved from http://fonas.org/pressemitteilung/FONAS_Forschungsmemorandum_Nov_2015.pdf
  28. Ford, C. A. (2010). The Trouble with Cyber Arms Control. The New Atlantis, (29), 52–67.Google Scholar
  29. Forge, J. (2010). A note on the definition of “dual use.” Science and Engineering Ethics, 16(1), 111–118.  https://doi.org/10.1007/s11948-009-9159-9
  30. Franke, U. E. (2017). Die Revolution in Militärischen Angelegenheiten. In T. Ide (Ed.), Friedens- und Konfliktforschung (pp. 69–92). Opladen, Berlin, Toronto: Verlag Barabara Budrich.Google Scholar
  31. Freiling, F., Grimm, R., Großpietsch, K.-E., Keller, H. B., Mottok, J., Münch, I., … Saglietti, F. (2014). Technische Sicherheit und Informationssicherheit. Informatik-Spektrum, 37(1), 14–24.  https://doi.org/10.1007/s00287-013-0748-2
  32. Galtung, J. (1969). Violence, Peace, and Peace Research. Journal of Peace Research, 6(3), 167–191.Google Scholar
  33. Gandhi, R., Sharma, A., Mahoney, W., Sousan, W., Zhu, Q., & Laplante, P. (2011). Dimensions of Cyber-Attacks. IEEE Technology and Society Magazine, 28–38.Google Scholar
  34. Gleditsch, N. P., Nordkvelle, J., & Strand, H. (2014). Peace research - Just the study of war? Journal of Peace Research, 51(2), 145–158.  https://doi.org/10.1177/0022343313514074
  35. Gruber, T. (2015). Die Informatik in der modernen Kriegsführung. FIfF-Kommunikation “Rüstung Und Informatik,” 3, 39–41.Google Scholar
  36. Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber security, and the copenhagen school. International Studies Quarterly, 53(4), 1155–1175.  https://doi.org/10.1111/j.1468-2478.2009.00572.x
  37. Hourcade, J. P., & Bullock-Rest, N. E. (2011). HCI for Peace: A Call for Constructive Action. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI) (pp. 443–452). New York, USA: ACM Press.  https://doi.org/10.1145/1978942.1979005
  38. Hourcade, J. P., & Nathan, L. (2013). Human computation and conflict. In P. Michelucci (Ed.), Human Computation and Conflict (pp. 1–17). New York: Springer.Google Scholar
  39. Hügel, S. (2017). Forum InformatikerInnen für Frieden und gesellschaftliche Verantwortung e.V. https://www.fiff.de/
  40. IAEA. (2018). IAEA Safeguards Overview. Retrieved from https://www.iaea.org/publications/factsheets/iaea-safeguards-overview
  41. ICT4Peace Foundation. (2017). Perspectives on Responsible Behavior in State Uses of ICTs. ICT for peace. https://ict4peace.org/wp-content/uploads/2017/02/ICT4Peace-Book-Draft.pdf
  42. ISO 27001. (2015). Informationstechnik - IT-Sicherheitsverfahren - Informationssicherheits-Managementsysteme - Anforderungen (ISO/IEC 27001:2013 + Cor. 1:2014).Google Scholar
  43. Koppe, K. (2010). Zur Geschichte der Friedens- und Konfliktforschung im 20. Jahrhundert. In P. Imbusch & R. Zoll (Eds.), Friedens- und Konfliktforschung. Eine Einführung (pp. 17–66). Wiesbaden: VS Verlag für Sozialwissenschaften.Google Scholar
  44. Lange, S. (2004). Netzwerk-basierte Operationsführung (NBO). Streitkräfte-Transformation im Informationszeitalter. Berlin.Google Scholar
  45. Mansfield-Devine, S. (2009). Darknets. Computer Fraud & Security, 2009(12), 4–6.  https://doi.org/10.1016/S1361-3723(09)70150-2
  46. Mascolo, G., Steinke, R., & Tanriverdi, H. (2018, March). Die Geschichte eines Cyber-Angriffs. Süddeutsche Zeitung.Google Scholar
  47. Müller, H. (2003). Begriff, Theorien und Praxis des Friedens. In G. Hellmann, K. D. Wolf, & M. Zürn (Eds.), Die neuen Internationalen Beziehungen. Forschungsstand und Perspektiven in Deutschland (pp. 209–250). Baden-Baden: Nomos Verlagsgesellschaft.Google Scholar
  48. Nakashima, E., & Warrick, J. (2012). Stuxnet Was Work of U.S. and Israeli Experts, Officials Say. Washington Post.Google Scholar
  49. NATO. Warsaw Summit Communiqué (2016). https://www.nato.int/cps/en/natohq/official_texts_133169.htm
  50. Neuneck, G. (2017). Krieg im Internet? Cyberwar in ethischer Reflexion. In I.-J. Werkner & K. Ebeling (Eds.), Handbuch Friedensethik (pp. 805–816). Wiesbaden.  https://doi.org/10.1007/978-3-658-14686-3_58
  51. Reuter, C., & Kaufhold, M.-A. (2018). Usable Safety Engineering sicherheitskritischer interaktiver Systeme. In C. Reuter (Ed.), Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement (pp. 19–40). Wiesbaden, Germany: Springer Vieweg.Google Scholar
  52. Rid, T. (2012). Cyber War Will Not Take Place. Journal of Strategic Studies, 35(1), 5–32.  https://doi.org/10.1080/01402390.2011.608939
  53. Rousseau, J.-J. (1972). Du contrat social ou principes du droit politique (Bibliothè). Bruxelles: Bordas.Google Scholar
  54. Sanger, D. E. (2014). Syria War Stirs New U.S. Debate on Cyberattacks. New York Times.Google Scholar
  55. Sarkees, M. R. (2000). The Correlates of War Data on War: an Update to 1997. Conflict Management and Peace Science, 18(1), 123–144.Google Scholar
  56. Sauer, F., & Schörnig, N. (2012). Killer drones: The “silver bullet” of democratic warfare? Security Dialogue, 43(4), 363–380.  https://doi.org/10.1177/0967010612450207
  57. Schmitt, M. (2013). Tallinn Manual on the International Law Applicable to Cyber Warfare. New York, NY: Cambridge University Press.Google Scholar
  58. Shackelford, S. J. (2013). Toward Cyberpeace: Managing Cyberattacks through Polycentric Governance. American University Law Review, 62(5), 94.Google Scholar
  59. Stauffacher, D., Drake, W., Currion, P., & Steinberger, J. (2005). Information and Communication Technology for Peace. New York: The United Nations Information and Communication Technologies Task Force.Google Scholar
  60. Uppsala University, D. of P. and C. R. (insitution). (2017). Uppsala Conflict Data Program Conflict Encyclopedia (UCDP database).Google Scholar
  61. US Department of Defense. (1998). Information Warfare Policy (CJCS 3210.01).Google Scholar
  62. von Clausewitz, C. (2005). Vom Kriege. Frankfurt am Main: Insel-Verlag.Google Scholar
  63. von Solms, R., & van Niekerk, J. (2013). From information security to cyber security. Computers and Security, 38, 97–102.  https://doi.org/10.1016/j.cose.2013.04.004

Copyright information

© Springer Fachmedien Wiesbaden GmbH, ein Teil von Springer Nature 2019

Authors and Affiliations

  • Christian Reuter
    • 1
    Email author
  • Larissa Aldehoff
    • 2
  • Thea Riebe
    • 2
  • Marc-André Kaufhold
    • 2
  1. 1.Science and Technology for Peace and Security (PEASEC) Department of Computer ScienceTechnische Universität DarmstadtDarmstadtGermany
  2. 2.TU Darmstadt, Science and Technology for Peace and Security (PEASEC)DarmstadtGermany

Personalised recommendations