View: session overviewtalk overview
Through compelling real-world case studies and stories of anti-corruption activism from around the world, the talk sheds light on how grassroots movements are using digital technologies to promote integrity in their societies and pave the way for a more accountable world. It explores the transformative potential of digital technologies in the grassroots fight against corruption. It presents a typology of anti-corruption technologies, discusses their opportunities and examines the challenges they pose to civil society organisations. It also analyses their impact on democracy and civic engagement, highlighting the democratic ideals embedded in these technologies and their role in redefining citizenship and promoting active participation in society.
13:30 | Civil Protection in a State-Centric Risk Culture - The Role of Warning Apps in Germany ABSTRACT. Warning apps offer a mobile crisis alert system with access to multi-media content, reliable agency information and options for personalization (Hauri et al., 2022; Reuter & Kaufhold, 2018). These apps aim to ensure situational awareness during crises and provide preventive and response advice. In contrast to everyday applications that are also used in crises (Tan et al., 2017), warning apps are specifically designed for disaster purposes and have specific design requirements, geared at simplicity, trustworthiness, timeliness and reliability (Bonaretti & Fischer, 2021; Tan et al., 2020). Despite their potential, low usage numbers across European countries (Hauri et al., 2022) indicate a lack of awareness or prioritisation, especially since warning apps are generally regarded as important and useful (Haunschild et al., 2022; Kaufhold et al., 2020). Regarding the individual contribution to crisis preparedness, Germany is repeatedly found to be an intriguing case where a general interest in crisis information can be found, while the readiness to prepare for disasters is low. Even though less than 90% of Germans feel informed or very informed about disasters and less than 80% feel prepared or well prepared, only 21% plan to prepare quite a lot or a lot (Appleby-Arnold & Brockdorff, 2018). Research indicates that in Germany, this may be due to a state-centric risk culture, in which people feel that the state takes care of emergency management and personal responsibility for preparedness is therefore small (Cornia et al., 2016; Reuter & Kaufhold, 2018). The analysis of German warning apps indicates that state agencies are fostering this state-centric risk culture. Here, preparedness information is side-lined and relegated to a non-interactive menu item. Topics and functions related to security are largely neglected. The presentation shows the state of research on warning apps and potentials for enhancing their utility for citizens and for security related crises. First, the results of representative and qualitative surveys, and usage trends over time are presented. Then, strategies for enhancing the usefulness of warning apps and increasing usage and results from experiments are shown. Finally, further potentials for enhancing the use of warning apps are discussed, with reference to the Finnish warning app and the Ukrainian app Diia, which has taken on unforeseen functions during the war. Overall, this research sheds light on the potential of warning apps for civil protection and crisis preparedness, providing valuable insights for their future development and implementation. Appleby-Arnold, S., & Brockdorff, N. (2018). Culture and disaster risk management—Synthesis of citizens’ reactions and opinions during 6 Citizen Summits: Romania, Malta, Italy, Germany, Portugal and the Netherlands. CARISMAND Report. Bonaretti, D., & Fischer, D. (2021). Timeliness, trustworthiness, and situational awareness: Three design goals for warning with emergency apps. Forty-Second International Conference on Information Systems, 1–17. Cornia, A., Dressel, K., & Pfeil, P. (2016). Risk cultures and dominant approaches towards disasters in seven European countries. Journal of Risk Research, 19(3), 288–304. https://doi.org/10.1080/13669877.2014.961520 Haunschild, J., Kaufhold, M.-A., & Reuter, C. (2022). Perceptions and Use of Warning Apps—Did Recent Crises Lead to Changes in Germany? Proceedings of Mensch Und Computer 2022, 25–40. https://doi.org/10.1145/3543758.3543770 Hauri, A., Kohler, K., & Scharte, B. (2022). A comparative assessment of mobile device-based multi-hazard warnings: Saving lives through public alerts in Europe. Risk and resilience Report, Center for Security Studies. https://doi.org/10.3929/ethz-b-000533908 Kaufhold, M.-A., Haunschild, J., & Reuter, C. (2020). Warning the public: A survey on attitudes, expectations and use of mobile crisis apps in Germany. Proceedings of the European Conference on Information Systems (ECIS). http://www.peasec.de/paper/2020/2020%5FKaufholdHaunschildReuter%5FWarningthePublic%5FECIS.pdf Reuter, C., & Kaufhold, M.-A. (2018). Fifteen years of social media in emergencies: A retrospective review and future directions for crisis informatics. Journal of Contingencies and Crisis Management (JCCM), 26(1), 41–57. https://doi.org/10.1111/1468-5973.12196 Tan, M. L., Prasanna, R., Stock, K., Doyle, E. E. H., Leonard, G., & Johnston, D. (2020). Modified usability framework for disaster apps: A qualitative thematic analysis of user reviews. International Journal of Disaster Risk Science, 11(5), 615–629. https://doi.org/10.1007/s13753-020-00282-x Tan, M. L., Prasanna, R., Stock, K., Hudson-Doyle, E., Leonard, G., & Johnston, D. (2017). Mobile applications in crisis informatics literature: A systematic review. International Journal of Disaster Risk Reduction, 24, 297–311. https://doi.org/10.1016/j.ijdrr.2017.06.009
|
13:50 | Protest and technology in the national strike of 2021 in Cali, Colombia through an intersectional perspective ABSTRACT. Long, massive, peaceful and violent demonstrations occurred between April and June, 2021 in Colombia. At the beginning, they were organized by university students, unions and social organizations who opposed draft bills that were against impoverished people because of the COVID-19 pandemic. After the first mobilizations, reasons and people who went to the streets changed: it was against police violence and besides organizations, young people who have never mobilized nor organized came to the streets. Cali was the core of the violent protests and technology supported demonstrators or sabotaged mobilizations. Then women and LGBTIQ+ persons of Cali spread a wide range of objects to protest in the streets for a long time period. Consequently, these questions guide the research: how women and LGBTIQ+ persons used technology to protest? What is the meaning and significance of technology during peaceful and violent protests? How technology was stored or discarded after the national strike ended? How has the behavior of activists changed since the strike ended? Technology is understood within a broader and historical perspective: as an artifact created by specific people, with a material expression, which innovates, creates, substitutes or disseminates a previous idea or knowledge and has a political program. The main hypothesis is that artifacts used to protest require a political and empirical knowledge; after technologies have been used, stored or discarded, they transform women and LGBTIQ+ persons, especially those who have never mobilized. This understanding is in contrast to research that focuses on protests in social media, technological infrastructure, the quantity and quality of protests in regards to democracy or the (re)creation of memory places by demonstrators. On the other hand, research about social movements only considers people who belong to them and women as political subjects. Questions and hypotheses will be answered and supported with a qualitative approach through interviews, objects and bibliography review. This triangulation will help to understand perspectives in tension due to violent and peaceful protests. Black, trans women, lesbian women and gay men who protested in favor of the national strike or against the police violence will be considered as key subjects of this historical time. |
14:00 | Inside China‘s Cyber System – Ambitions, Actors, Instruments ABSTRACT. China's increasing influence is having a profound impact on global security and democracy (Stoltenberg, 2022): The U.S. National Security Strategy identifies China as a systemic rival in the context of strategic competition (White House, 2022a). At this time, Germany is working on a new China strategy - it is suspected that the tone toward China will become more critical. Currently, however, depending on the policy area, China is simultaneously a cooperation partner, negotiating partner, economic competitor, and systemic rival for European countries (European Commission, 2019). In the digital era, geopolitical conflicts are shifting to cyberspace. Consequently, new technologies and the digital realm have become a significant arena of competition between the United States and China as major world powers, as exemplified by the U.S. "Chips Act" (White House, 2022b). Technology is no longer merely a domain of opportunities and possibilities; it has evolved into a "battleground for control, values, and influence" (Gallardo/Fleming, 2022). In President Xi's vision for China, cyberspace plays an essential strategic role: China aspires to become a cyber (great) power and to take technological leadership (Creemers, 2021; Voo/Creemers, 2021; Rühlig et al., 2022). The ambitions in this context span over the full spectrum of political, economic, and social issues, motivated by a variety of reasons (Chang, 2014). To achieve these objectives, China employs various strategies: Technological standardization and dominance in new technologies, e.g., AI and 5G, are strategically instrumentalized, to influence actors and promote international norms that serve Chinas interests (Fischione et al., 2022; Björk/Rühlig, 2022). In addition, technological self-reliance is sought to minimize own vulnerabilities (Cary, 2021). Various global platforms, including the UN, as well as major economic projects, such as the "digital silk road," also serve as venues to expand one's own influence and promote alternative narratives to foster a more China-centric global digital order (Dekker/Okano-Heijmans, 2022; Creemers, 2020). This vision, which is based on a state-centric, westphalian understanding of sovereignty in cyberspace, contrasts with the currently dominant Western notion of a free Internet (Creemers, 2020). All this is supported by strong political will and extensive institutional restructuring in the cyber governance landscape (Creemers, 2021; Chang, 2014). Gaining a comprehensive understanding of cyberspace developments is imperative for informed policy-making e.g., for the continued organization of a coherent international cyber diplomacy, which is central to protecting and strengthening Europe's digital sovereignty. In this context, China represents a pivotal actor with the potential to disrupt the current international order and stability in cyberspace. However, there is a significant knowledge gap concerning Chinese cyber policy. Therefore, it is crucial to identify and comprehend China's aspirations in cyberspace, fostering dialogue and knowledge sharing on this topic. This presentation seeks to shed light on China's cyber system by providing an overview of its ambitions in cyberspace, the motivations driving them, and the different strategies, means, structures, and stakeholders involved in this system. Björk, M. & Rühlig, T. (2022): Power competition and China’s technical standardization. In: Rühlig, T. (2022): China’s Digital Power. Assessing the Implications for the EU. In: Rühlig, T. (Ed.). China’s Digital Power Assessing the Implications for the EU. Berlin: CDP. / Cary, D. (2019): China’s National Cybersecurity Center. A Base for Military-Civil Fusion in the Cyber Domain. Washington: CSET. / Chang, A. (2014): Warring State China’s Cybersecurity Strategy. Washington: Center for a New American Security. / Creemers, R. (2021): China’s Cyber Governance Institutions. Leiden: Universiteit Leiden. / Creemers, R. (2020): China’s Approach to Cyber Sovereignty. Berlin: Konrad-Adenauer-Stiftung. / Dekker, B. & Okano-Heijmans, A. (2022): Projecting digital power internationally: Europe’s digital China challenge. In: Rühlig, T. (Ed.). China’s Digital Power Assessing the Implications for the EU. Berlin: CDP. / European Commission (2019): EU-China – A strategic outlook. Brussel: European Commission. / Fischione, C.; van der Lugt, S. & van der Putten, F.-P. (2022): AI and IoT Developments in China and the Relevance for EU Policy – a scoping study. In: Rühlig, T. (Ed.). China’s Digital Power Assessing the Implications for the EU. Berlin: CDP. / Gallardo, C. (2022): UK spy chief: Britain must invest more to counter China’s tech dominance. Online: https://www.politico.eu/article/uk-must-invest-more-to-see-off-chinas-tech-dominance-spy-chief-says/utm_source=blognotification&utm_medium=email&utm_campaign=Blog%20Post%20Notification%20Net%20Politics&utm_term=NetPolitics (last accessed: 3.3.2023). / Voo, J. & Creemers, R. (2021): China’s Role in Digital Standards for Emerging Technologies – Impacts on the Netherlands and Europe. Leiden: Universiteit Leiden. / White House (2022a): National Security Strategy. Washington: White House. /White House (2022b): FACT SHEET: CHIPS and Science Act Will Lower Costs, Create Jobs, Strengthen Supply Chains, and Counter China. Online: https://www.whitehouse.gov/briefing-room/statements-releases/2022/08/09/fact-sheet-chips-and-science-act-will-lower-costs-create-jobs-strengthen-supply-chains-and-counter-china/ (last accessed: 3.3.2023). |
Unmasking Digital Threats in the Pursuit of Human Rights and Environmental Defense in La Guajira and Cesar, North Colombia PRESENTER: Laura Guntrum ABSTRACT. During decades of armed conflict between guerrillas, state armed forces, and paramilitaries in Colombia, minimal attention has been paid to the protection of digital rights. Furthermore, it is reported that during the armed conflict a surveillance apparatus to spy on citizens without judicial order was set up in Colombia (Erb, 2019). This paper investigates the alarming (digital) human rights violations committed against social leaders in La Guajira and Cesar, North Colombia, who advocate for human rights and against environmental destruction caused by, amongst others, one of the biggest coal mines in Latin America (El Cerrejón) and numerous wind farms (Osorio García de Oteyza et al., 2021; Schwartz, 2020). According to Villalba (2021) in the national newspaper El Espectador, “threats are part of the daily life of social leaders in Colombia. And social networks and instant messaging services have also been a channel used by violent individuals to intimidate communities”. Based on qualitative interviews, the paper examines how digital threats are perceived by social leaders and whether and how digital security issues contribute to further violence. The research findings reveal that digital violence and digital death threats through (WhatsApp) calls, Facebook (Messenger), and SMS are prevalent in the region and are likely attributed to a variety of actors, including illegal armed groups and private companies operating in the region. In addition, social leaders encounter further challenges arising from internal divisions within their communities, exemplified by digital threats posed against them by own community members. In reaction, certain measures, like refraining from sharing their live location, are being implemented. However, secure applications such as Signal are seldomly used, confirming the overall perception that digital security issues play a predominantly subordinate role in their defense. Besides digital threats, numerous leaders experience that their accounts are being hacked, and they also often experience hate speech through social media platforms. Additionally, there is a pervasive sense of digital surveillance, adding to the challenges they encounter while using information and communication technologies (ICTs) for their defense. The interviews reveal that while the majority of social leaders maintain their own security protocols, these protocols often neglect to adequately address the risks posed in the digital realm. The paper underscores the importance of equipping social leaders with the necessary knowledge and resources to effectively use ICTs in a secure manner. Furthermore, ensuring the availability of user-friendly, secure, and offline applications that can function efficiently in areas with limited connectivity is of high importance. The precarious nature of connectivity, particularly in rural parts of the region, accentuates the need for adaptive and resilient ICT solutions. This highlights the approach required to strengthen the crucial work of promoting human rights and environmental defense in this field, by empowering social leaders with the necessary expertise and access to suitable ICTs.
Erb, S. (2019, February 26). Colombia’s sprawling spy network a threat to freedom. DW Akademie. https://akademie.dw.com/en/colombias-sprawling-spy-network-a-threat-to-freedom/a-47691828 Osorio García de Oteyza, M., Estupiñán Estupiñán, Ó. J., & Fuentes-Lara, M. C. (2021). Retos de paz y derechos humanos en la comunidad Wayúu en la Alta Guajira (Colombia). Revista de Paz y Conflictos, 13(2), 25–51. https://doi.org/10.30827/revpaz.v13i2.11247 Schwartz, S. (2020). Wind extraction? Gifts, reciprocity, and renewability in Colombia’s energy frontier. Economic Anthropology, 8(1), 116–132. https://doi.org/10.1002/sea2.12192 Villalba, V. C. (2021). Lo bueno, lo malo y lo feo de las redes sociales para los y las líderes en Colombia | EL ESPECTADOR. https://www.elespectador.com/colombia-20/paz-y-memoria/lo-bueno-lo-malo-y-lo-feo-de-las-redes-sociales-para-los-y-las-lideres-en-colombia-article/ |
NewSpace and proliferation risks – mapping the regulation of commercial space activities ABSTRACT. The dual-use character of many space technologies and concerns over the trade in such technologies are not new. However, with the rise of the NewSpace industry the range of possible missile proliferation risks has broadened. A multitude of new private actors are emerging in a growing number of countries, often with a lack of awareness about the regulatory environment in place, and resulting gaps in their compliance procedures which could be exploited. Recent technological developments in the space industry also increase proliferation risks, not least due to the growing similarities between small and micro launchers and ballistic missiles. The global regulation of NewSpace industry activities is essential to address these proliferation risks. It takes place in part through international space treaties, which establish legally-binding obligations for States parties to take responsibility for objects launched into orbit, and to engage with their national space industry, thus creating a framework for national oversight of the industry. Multilateral export control regimes also have a key role to play. They count many of the states developing their NewSpace industry as members, and their control lists largely cover dual-use missile and SLV technology. In addition, other multilateral tools are relevant to prevent the sharing of sensitive technologies related to missiles in the context of NewSpace, such as foreign direct investment screening mechanisms. As a whole, these instruments make up a complex regulatory environment for new entrants in the sector – whether these are states or private actors. The poster will map the existing regulatory environment and highlight possible remaining gaps, after briefly introducing why NewSpace poses specific proliferation risks, and which space technologies and activities are of particular concern. In doing so, it aims to clarify and increase understanding about applicable regulations over NewSpace activities involving dual-use space technology, and about possible ways forward in addressing developments within the NewSpace industry. |
Global Critical Infrastructures ABSTRACT. Critical infrastructure (CRITIS) is “an asset or system which is essential for the maintenance of vital societal functions”. In other words, CRITIS are essential for the supply of populations, but the concept is only ever applied to the national scale. But what are the critical infrastructures of humanity as a whole? In the face of accelerating environmental change, this contributions asks whether humanity’s infrastructures are prepared for supplying all of humankind while adapting to more sustainable modes of governing essential functions. Its main aim is a reconceptualization and a rescaling of the CRITIS concept to a global scale. To that end, it first identifies “core” CRITIS sectors from a comparison of national taxonomies based on CIPedia’s survey (https://websites.fraunhofer.de/CIPedia/index.php/Critical_Infrastructure_Sector). As a next step, the potential for a global approach towards these sectors and their services is assessed with a view towards a sustainable transformation of critical infrastructures, e.g. by prioritizing access to mass transit over individualized car traffic, or by preferring renewable energy generation over fossil fuels. The contribution then sketches a theoretical framework how such global critical infrastructures are currently governed. Drawing on the literatures on global governance and global public goods, it takes a relational approach and focuses on agents and interactions due to the relatively low degree of institutionalization and greater prevalence of market mechanisms compared to other governance fields. Based on this theoretical approach, the contribution offers scope for a normative assessment how global critical infrastructures should be governed to improve access for all of humanity while making infrastructures more ecologically sustainable. |
Information Warfare on Twitter: Disinformation in the Russo-Ukrainian War ABSTRACT. Social media has become a place for information operations, in particular in the context of warfare. The aim of this work is to identify factors that influence the spread of disinformation in the Russo-Ukrainian war on social media. Based on a data collection on the microblogging service Twitter, from March to April 2022, factors that could have an impact on the sharing of disinformation among Ukrainian and Russian-speaking social media users were investigated: political attitude, physical location, social media user type, trustworthiness of sources, and type of media. The quantitative analysis included 3,000 tweets and showed that especially pro-Russian social media users spread disinformation. Using an untrustworthy source (in the form of an article, image or video) in a tweet or misjudging the truth of a source also positively influences the sharing of disinformation for both Ukrainian- and Russian-speaking social media users. Thus, a strong ``media literacy'' is important for identifying both Ukrainian and Russian disinformation. As online and offline spheres are increasingly intertwined while intensified dynamics of ``tech nationalism'' reflect efforts to construe virtual spaces along national borders, we are particularly interested in how the physical localization of users affects their sharing behavior. In this regard, we find that localization can indirectly affect political attitudes among Russian-speaking social media users and thereby contribute to the generation of disinformation. Building on the insight that the the impact of physical developments (in war) and different physically-bounded media ecosystems is outweighed by the effects of political attitude and consumption of untrustworthy (digital) media, we formulate design-oriented implications with the goal to foster media literacy across national contexts. |
Supporting Victims of Hate Speech: The Role of German Reporting Centers as Intermediaries with Counseling Centers, Authorities and Digital Platforms ABSTRACT. The relationship between online hate speech and physical political violence has come to the attention of German policymakers, not least following the far-right motivated murder of Walther Lübcke, the regional district president of Kassel. To counter online hate speech, socio-technical measures have already been proposed that address the level of content, individual internet users, communities of users, civil society, or platforms. While all German states and the federal government have taken countermeasures, major differences can be observed. This applies in particular to the provision of or cooperation with reporting centers. As previous work has only peripherally addressed such organizations, this poster aims to explore the role of reporting centers in combating online hate speech in Germany and the emerging research gaps in this context. Drawing on a review of relevant academic literature as well as civil society publications and policy documents, the poster (1) provides an initial overview of the German reporting center landscape, (2) presents a preliminary model of how reporting centers act as intermediaries between victims and counseling centers, authorities, and platforms, (3) outlines initial opportunities for technology support, and (4) finally identifies a need for more in-depth research on the collaborative work processes in reporting centers. |
Political Violence, Populism and Social Media in Brazil ABSTRACT. This paper addresses the interrelations of political violence, populism and social media, using the striking case of the recent tense and eventful Brazilian presidential election process in 2022/23. It looks into new forms of digital populism in Brazil. It argues that the emergence of social media transforms the nature of political violence, as the invasion in Brasília on January 8 demonstrates. On this example, it discusses the role of social media platforms and centers the discussion on the interpretation that the attacks of the national congress were staged as "a coup for the Instagram age”. |
Chemical Weapons Investigation Mechanisms in Syria: Scientific Methods and Standard of Proof ABSTRACT. The use of chemical weapons is comprehensively banned under the Chemical Weapons Convention (CWC) and customary international law. This comprehensive prohibition does not only apply to states but also to individuals. While the CWC does foresee procedures for ascertaining chemical weapons use and identifying perpetrators in Article IX (Consultations, Cooperation, and Fact‑Finding) and Verification Annex Part XI (Investigations in Cases of Alleged Use of Chemical Weapons), these articles were not employed in the first cases of chemical weapons use by a CWC state party, i.e., in the context of the Syrian civil war. Instead, several ad-hoc mechanisms were established with either the objective of fact-finding or attributing responsibility based on varying legal frameworks. This contribution aims to engage four of these mechanisms, namely, the early United Nations Mission through the United Nations Secretary-General's Mechanism (UNSGM), the Organization for the Prohibition of Chemical Weapons (OPCW) Fact-Finding Mission (FFM), the Joint Investigative Mechanism (JIM), and the Investigation and Identification Team (IIT). With distinctive mandates, the mechanisms followed different scientific methods in meeting varying standards of proof depending on the objectives pursued. For instance, in investigating allegations, UNSGM and FFM primarily relied on methods of biomedical and environmental sample analysis. On the other hand, the JIM and IIT utilized further scientific methods to conclude attribution, including chemical forensics, analysis of meteorological data and satellite images, ballistics analysis, munition analysis, and toxicology analysis. This work compares the mandates and legal foundations of the four mechanisms and the respective scientific methods utilized in evidence finding and attribution. This systematic comparison provides the basis for further discussions on how legal circumstances constitute scientific methodology and vice-versa. As such, the objective is to provide a better understanding of the relationship between legal objectives and related standards of proof with the different scientific methods used in investigation mechanisms |
Briar: Secure Messaging for Citizens and Activists during Internet Shutdowns ABSTRACT. A pattern commonly observed in situations of protests and crises is limited Internet connectivity due to either forced Internet shutdowns or infrastructure outages. While many popular instant messaging systems these days, like Signal and WhatsApp, offer sound cryptographic protection of messages' contents, they all require a working connection to some sort of server infrastructure in order to function. Briar is a free and open-source software messaging system that solves these problems by using a novel peer-to-peer approach. Depending on the Internet's availability, it uses the Tor network to directly deliver messages between communicating peers. However, if the Internet connection is cut, it can fall back to communication via Bluetooth, the local network, or communication via memory cards, enabling so-called sneakernets. All messages exchanged are end-to-end encrypted and due to the peer-to-peer nature metadata is protected as well. By these means, Briar enables self-organization of citizens and activists and allows them to keep communicating even in hostile environments. |
The 70:20:10 framework for regulatory compliance trainings.An opportunity for CBRN-WMD awareness trainings? ABSTRACT. Training about regulatory compliance is most urgent in contexts where you expect it the least. This applies for sure in a dual-use context. Business and their supply chains dealing with dual-use goods; i.e. goods, software and technology that can be used for both civilian and military applications; need to invest in training because the customers of these goods and services can disguise their true intended end-use. Because of the ambivalence and risks, the international laws and regulation for to the exchange of dual-use goods and services in commercial and research settings is complex. It has become increasingly important to assess whether business transactions are driven by commercial, academic versus national security/defense interests. L& D professionals working in these dual use contexts face a huge challenge. On the one hand, it is clear that dual-use trainings should help professionals to increase awareness about the security and dual-use risks and to combine wise ethical judgement with professional competence. On the other hand, the ways to design and to deliver these dual use training in contexts that matter are less understood. Regulatory compliance trainings are often considered for most participants to be a dull moment of time. The main problem is that most regulatory compliance trainings are designed without any consideration of the learning needs of staff. The trainings are simply imposed top-down. In order to accommodate the trainings more to the workforce, Hauser (2020) has diversified the roles of trainers and increased the options for the design of compliance trainings. He argues that instead of always putting their compliance knowledge or educational tools to the fore, trainers should evolve into guides and tutors for their trainees. The contribution of Hauser (2020) is a good start to make regulatory trainings more relevant. Moreover, this framework has strong parallels with the popular 70:20:10 framework in L& D community. I argue here that the model can be extended further by means of a more trainee centered approach. Hauser (2020) focusses mainly on what the trainer ought to do. Much can be gained by flipping the corporate classroom and focusing more radically on the trainee in the design of regulatory compliance trainings. Not only the learning goals of the trainer, but also the dilemmas of the trainee deserve time and attention. The focus of this poster is on how to design a regulatory compliance training that takes into account the diverse learning needs. Lessons learnt from the 70:20:10 framework lead me to focus on conditions for good communication: how to make sense of stories where both trainees and trainers are both experts and laymen. References Hauser, C. (2020). From preaching to behavioral change: Fostering ethics and compliance learning in the workplace. Journal of Business Ethics, 162(4), 835-855. https://doi.org/10.1007/s10551-019-04364-9 De Schryver, T. (2023) Designing Dilemma Trainings As Liminal Spaces For Behavioral Change. 2022 EAPRIL conference proceedings. https://tinyurl.com/yheadcwn |
Critical infrastructure and outer space: geopolitics, vulnerability, risk reduction and arms control ABSTRACT. Outer space is considered as part of the world’s critical infrastructure, both in the civilian and security sector. Satellites conduct numerous tasks, often dual-use, for reconnaissance, early warning, monitoring, weather observation, communications, navigation, environmental protection and research which support multiple infrastructures on earth for the economy and society, energy and resources, political stability and security, health and climate, among others. While the global market for space-related activities and investments is multiplying in the coming years, competition and cooperation are increasing among a growing number of governmental and non-governmental actors in North and South. When outer space is becoming an arena for geopolitical conflict, the infrastructure in orbit and on earth is becoming more vulnerable to cascading risk: interruption of communication by accidents, jamming or ground attacks; collision with other space objects and space debris; physical attack by explosive devices, cyber, nuclear, kinetic or directed energy weapons; sensor blinding; hacking, deception or hijacking. The survivability of space objects can be improved by passive or active protection and risk reduction measures, including physical hardening and shielding, manoeuvring capability, dummies, or active countermeasures. A code of conduct for responsible space behaviour can contribute to confidence-building, rules of the road, risk reduction and stabilization. With the proliferation of space launchers and missiles, missile defense and anti-satellite weapons, threats to space infrastructure would considerably increase, jeopardizing international stability. An arms race in space can be prevented through preventive arms control and disarmament which reduces the risk to the infrastructure on earth and in space. |
Oculta: Hidden Secure Communication via WhatsApp and Co. ABSTRACT. In tense situations, often there are requirements to communication current messaging systems aren't able to meet. While systems like Signal offer sound cryptographic protections to ensure confidentiality, authenticity, and more, using a separate messaging system often is not possible. Those systems might be censored in a given region, it might be illegal to have their apps installed (and one could get into trouble in road checks), or communication via, e.g., WhatsApp is preferred, because using it is free in that country and all contacts are there. WhatsApp officially states that it is using end-to-end encryption, but this can't be confirmed independently. In addition to that, some high-risk users need additional protections against physical attacks on their devices. To someone inspecting their devices, it should not be visible at the first glance that some secret communication is happening. Oculta (Spanish for “hidden”) is an Android application that allows to have cryptographically protected communication that is exchanged in a hidden manner via existing messaging systems like WhatsApp, Telegram, or email. For this, messages are protected using state-of-the art cryptography and hidden inside text or images using techniques from steganography. |
On the Origin of Gender Bias in Face Recognition ABSTRACT. Biometrics is defined as the automated recognition of individuals based on their behavioral or physical characteristics. Unintentional gender bias in the corresponding systems has significant consequences. Individuals, especially females, are systematically discriminated against since the algorithms experience higher error rates on these demographics. For this reason, gender bias is one of the pivotal unsolved problems in biometrics and face recognition in particular. Its impact is evident in various everyday application scenarios using facial recognition systems. These include the authentication on modern smartphones and laptops, the authorization of financial transactions, or even the identification for border control. Especially in situations relevant to criminal law, the unintentional malfunction of the algorithms has potentially severe consequences, such as the imprisonment of innocent individuals. Such occurrences critically impact the daily life of those affected and, thus, foster public mistrust in facial recognition systems in general. Legislators also intensively debate the use of face recognition in practice, despite its clear advantages over password- or token-based authentication. To find an effective fix for this deficiency, the underlying causes of gender bias must be identified, analyzed, and ultimately understood. Previous works have primarily focused on the unequal distribution of genders in training data as a possible origin. Despite their efforts, the actual impact of this circumstance on bias has recently been proven insignificant. This finding has instigated a paradigm shift in research, with studies from the near past now mainly evaluating the role of facial features in the broader issue. However, these works apply complicated analysis methods that use low-scale, low-variance face annotations and image databases, as well as evaluation techniques that can induce unwanted variations in the results. Additionally, they do not take correlations of facial features into account. These deficits limit the results’ expressiveness and generalizability. In this thesis, the effects of non-demographic facial characteristics on gender bias are comprehensively evaluated. The presented methodology exploits the advantages of the tree data structure to efficiently generate multiple combinations of attributes, which represent the presence or absence of relevant characteristics. Subsequently, annotated large-scale image databases with high variance are filtered for faces of males and females in which the desired attribute combinations are featured. Thus, the images’ performance and, hence, the characteristics’ impact on fairness can be reliably assessed using two state-of-the-art face recognition models. Crucially, the proposed approach can also account for correlating facial features by clustering and thus combining them such that they can effortlessly be treated as a single attribute. Overall, these properties make the proposed approach simple yet effective, with its results achieving high informational value and generalizability. Applying the presented methodology reveals that gender bias entirely disappears when the presence or absence of combinations of specific characteristics is equalized across the considered genders. Those include attributes related to facial hair, hairstyles, and particular occluding accessories. These outcomes are consistent across all considered experimental settings. This strongly indicates the role of the revealed facial features as the true origin of gender bias. Consequently, future works can leverage those findings. One viable strategy would be to develop recognition models agnostic to the respective characteristics during training and operation. Another possible approach is the introduction of bias mitigation techniques that limit the effect of these specific characteristics in the recognition process. Ultimately, the results of this thesis should notably aid in more effectively and precisely researching remedies for gender bias and, thus, critically reducing the unfair treatment of individuals. |
Technology Assessment of Dual-use ICTs – How to Assess Diffusion, Governance and Design ABSTRACT. The dissertation employs the epistemological framework of Technology Assessment (TA), integrating concepts from Critical Security Studies (CSS) and Human-Computer Interaction (HCI) to evaluate and design dual-use technologies. First, looking into cases of spillover effects, it examines the early-stage diffusion of dual-use innovations in expert networks and AI patents, revealing limited diffusion. Second, the dissertation delves into the governance of dual-use technologies through two case studies, including the regulation of AWS with a focus on Meaningful Human Control (MHC) and the evolving regulations surrounding strong cryptography and mass surveillance programs in the U.S., involving private companies as central actors. Third, focusing on the aspect of including dual-use assessment into technology design, the research investigates dual-use case of Open Source Intelligence System (OSINT) for cybersecurity while deriving design implications within the Value-Sensitive Design (VSD) framework. Findings emphasize the importance of participatory approaches to mitigate risks for indirect stakeholders. Overall, this interdisciplinary and multi-method dissertation contributes to understanding the specific risks associated with dual-use technologies in areas such as AI, AWS, cryptography, and OSINT, offering insights for regulation, design, and security considerations. |
Dear SPS-participant, With the SPS’23 just around the corner, we are pleased to draw your attention to a special format in this year’s conference program: a workshop to engage in a multi-perspective discussion on potential future challenges to global security: nuclear non-proliferation and safeguards in crisis situations. Our workshop, "Thinking about the future: Nuclear verification in a complex world," is dedicated to offering an opportunity to actively exercise interdisciplinary collaboration in peace and conflict research.
- Workshop Details- Title: Thinking about the future: Nuclear verification in a complex world - Date: Thursday 21.09.2023- Time: 16:00 – 17:45- Location: Kleiner Saal
- Workshop Highlights and Goals- Learn interactively about nuclear safeguards and potential future challenges.- Explore a hypothetical nuclear safeguards scenario in an interactive “world café” session and approach solutions through interdisciplinary conversations.- Contribute to a multi-perspective dialogue with your specific disciplinary background.
- Preparing for the Workshop No special prior knowledge or preparation is required to participate in the workshop. Nonetheless, we encourage those who would like to delve deeper into the workshop topic beforehand to check out our booklet with background information, which can be downloaded here.
- Secure Your Spot:While there is no need to officially register, we do have limited space available. To ensure you get a spot, we recommend arriving on time. We look forward to your participation in the “Thinking about the future” workshop, as your input and insights will contribute to the depth of discussion we aspire to achieve. Thank you for considering this opportunity, and we look forward to the inspiring discussions that lie ahead. See you at SPS’23! Best regards,
The VeSPoTec consortium
What are the possibilities and risks of promoting peacebuilding through Information and Communication Technologies (ICTs)? What are the needs and challenges of practitioners? And how can they benefit from scientific findings? Experts who work in research and practice of peacebuilding are brought together to discuss these questions as part of “Science. Peace. Security 2023”, this year co-organized by TraCe.
16:00 | Digital Peacebuilding – Potentials and Challenges of ICTs in Peacebuilding Efforts ABSTRACT. Digital peacebuilding presents a myriad of opportunities and challenges that need to be addressed to optimize its potential for conflict transformation. On the one hand, ICTs can help to overcome physical barriers and reach marginalized communities, facilitate data management, and promote interactivity in peacebuilding. On the other hand, digital threats such as hacking, privacy violations, and cyberbullying can jeopardize the safety of individuals and organizations involved in peacebuilding. Furthermore, access to technology and digital literacy is not universal, which can lead to inequalities in participation and engagement. Furthermore, the use of technology in peacebuilding may face cultural or political resistance, particularly in contexts where, for example, authoritarian governments seek to control information and discourse. This panel discussion will explore the opportunities and challenges of digital peacebuilding by looking at specific case studies and highlighting best practices, key lessons learned, and strategies for addressing digital risks and promoting inclusivity in peacebuilding. |
16:20 | Digitalization and e-government in the lives of urban migrants: Evidence from Bogotá ABSTRACT. Research on the role of information and communication technologies (ICT) to improve the lives of displaced people is a growing field. However, studies in this area have been conducted mainly in wealthy countries, with municipalities that are capable of supporting migrants or refugees. There is less evidence from middle-income host countries and how ICTs can help migrants in their resettlement efforts. To address this gap, this study examines ICT access and the use of e-government services by Venezuelan displaced people in Colombia and compares this group with short- and long-term residents of Bogotá. The descriptive analysis of the data reveals that, after controlling for demographic and socioeconomic characteristics, foreign displaced people are less likely to own ICT devices compared to short- and long-term residents, but over time do acquire ICT access. In addition, Venezuelan displaced people are less likely to use e-government services than their local peers even after controlling for demographic characteristics and internet access, with the exception of address registration. While this paper originally focused on post-displacement contexts, the talk will highlight how the results apply to a variety of post-conflict settings where digital solutions are deployed to meet collective social and economic needs. |
16:40 | The Ethics of PeaceTech: Ownership and Outsourcing of Risk in Distributed Systems PRESENTER: Andreas Hirblinger ABSTRACT. The growing use of digital technologies in efforts to end violent conflicts and build peace has triggered an increased concern with their associated risks and ethical challenges, which is well visible in the growing number of policy- and practice-oriented publications. Digital peacebuilding efforts have enabled remote and decentered approaches executed through human-machine networks in which agency emerges as a distributed effect. Often, these networks entail global partnerships involving technology and peacebuilding professionals in digital infrastructures that stretch from Silicon Valley, over the headquarters of international organizations, to local peacebuilding initiatives. This means that the impacts of digital peacebuilding interventions and their potential adverse effects can usually not be directly controlled. However, the contours of this newly emerging “ethics of PeaceTech” discourse and the specific distribution of risks and responsibilities it entails have received scant scholarly attention so far. To address this gap, the paper presents a qualitative analysis of the most pertinent policy- and practice guidelines on digital peacebuilding and sheds light on their underlying ethics perspectives and risk management strategies. It argues that duty-based, consequentialist, and virtue ethics perspectives on PeaceTech serve as vectors that individualize and decenter the responsibility for the adverse effects of digital peacebuilding. By explicitly or implicitly framing these adverse effects as „risks” and outsourcing them to virtuous end-users or third parties, discourses on the ethics of digital peacebuilding advertently or inadvertently push responsibility on those parts of the networks that are least resilient. |
17:00 | An intersectional feminist lens on digital peacebuilding ABSTRACT. From social media activism to minority surveillance: New technologies are having a profound impact on the field of peacebuilding. The hope that digitalisation would promote inclusion and equality is contrasted with the sobering reality that mechanisms of marginalisation are often reproduced in the digital sphere. The Berghof Foundation and the Platform for Peaceful Conflict Transformation have commissioned a study that fills a gap in existing literature and practice where intersectional feminist approaches to technology meet intersectional feminist approaches to peacebuilding. The study explores how intersectionality can help increase the opportunities and reduce the risks of digital peacebuilding. The authors argue that incorporating an intersectional feminist lens into peacebuilding helps to start from a better understanding of privilege and discrimination to address recurring challenges to effective, inclusive peace processes. The paper also shows that the strategic goal of approaching digital technology through an intersectional feminist lens is to mitigate the discrimination built into technology design and use. |
The Darmstadt ensemble is architecturally and artistically groundbreaking and marks a turning point in architecture and art on the threshold of the 20th century. The tour of the UNESCO World Heritage Site "Mathildenhöhe Darmstadt" tells the story of the entire ensemble. The tour includes the studio building, the exhibition building, the artists' houses and the park. The tour starts at the Infopoint Mathildenhöhe. It is possible to reach the tour by bus. Remember to purchase a bus ticket.
- Meeting point for the tour: Infopoint Mathildenhöhe, Olbrichweg 10, 64287 Darmstadt.
- Departure from Lichtenberghaus: Bus stop Darmstadt Fasanerie, bus FU, departure 17:55 or 18:10, arrival 18:00 or 18:15 at bus stop Darmstadt Lucasweg/Mathildenhöhe.
- Return to Lichtenberghaus: Bus stop Darmstadt Lucasweg/Mathildenhöhe, bus F, departure 19:30 or 19:45, arrival at bus stop Darmstadt Fasanerie at 19:34 or 19:49.
The IANUS Prize is intended to recognize outstanding qualification work with IANUS relevance from all disciplines of the TU Darmstadt.
Students as well as scientists should be motivated to deal with questions in the field of scientific-technical peace and security research in a differentiated way.
Qualification work (especially studies/projects, bachelor's or master's theses, publications or dissertations) that were completed in the last 24 months before the nomination deadline and deal with IANUS-relevant issues can be submitted.
Details: https://peasec.de/2023/ausschreibung-ianus-preis-2023/