TraCe: Regional Research Center „Transformations of Political Violence“ (1.4.2022-31.3.2026, BMBF)
The historical progression of modern societies and International Relations (IR) is commonly portrayed as a gradual renunciation of violence. Nevertheless, the notion of overcoming organised violence remains unaddressed. Instead, contemporary trends indicate a reversion to this phenomenon. There has been an escalation in global conflict, and the processes of globalization and technological advancement are facilitating the emergence of novel forms of warfare and terrorist violence. These developments indicate transformations that challenge existing norms and practices for containing political violence. The Regional Research Center „Transformations of Political Violence“ has been established to examine these developments with the aim of identifying the consequences for domestic and international peace and developing strategies to contain political violence under changing conditions.
The Regional Research Center „Transformations of Political Violence“ is a cooperative project of the Leibnitz Institute for Peace and Conflict Research (PRIF), the Goethe University Frankfurt, the Justus Liebig University Giessen, the Philipps University Marburg and the Technical University of Darmstadt. The initiative is funded by the Federal Ministry of Education and Research (BMBF) and is scheduled to run from April 2022 to March 2026.
The establishment of the regional research centre has resulted in an intensification of existing cooperation and a pooling of expertise in interdisciplinary violence research among the participating partner institutions. The development of a thematic profile and the establishment of permanent series of events will create a regional competence centre for research, teaching and knowledge transfer that is internationally visible and systematically contributes to the containment and prevention of political violence.
The centre brings together disciplinary perspectives from a range of fields including political science, sociology, history, law, social anthropology, social psychology, cultural studies, linguistics and computer science, as well as various methodological approaches. It systematically examines the interplay of different types and levels of political violence in three thematic research fields, as well as in a synergy field.
2025
[BibTeX]
@book{schmidGoverningInSecuritySociotechnical2025,
address = {Wiesbaden, Germany},
title = {Governing ({In}){Security}: {Socio}-technical {Interactions} in {International} {Relations}},
publisher = {Springer Vieweg},
author = {Schmid, Stefka},
year = {2025},
keywords = {Crisis, Peace, Projekt-TraCe, Projekt-NEBULA, DissPublisher},
}
[BibTeX] [Abstract]
In conflict-ridden environments, timely and accurate information is critical for those dealing with the dynamic of events. When individuals have to flee, it becomes evident that refugees frequently rely on information and communication technologies (ICT) for information acquisition, travel coordination, and maintaining connections with related parties. Based on 17 interviews, this research explores how Ukrainian refugees, who sought protection in Germany due to the 2022 Russian full-scale invasion, use ICT before, during, and after their flight. By providing empirical findings, the results show in depth how contextual factors, such as infrastructural instability, privacy concerns and an advanced digitalization, interrelate with user behaviors. Analyzing the multifaceted civilian ICT use in the context of war and flight, this exploratory research contributes to the existing research on HCI in migration contexts and connects to several topics of CSCW. By contrasting case specifics, this work highlights what makes Ukraine a special case in this research area. Furthermore, this paper examines both existing and emerging affordances of ICT in the context of flight, and identifies the crucial role of messenger groups for information gathering in all phases of the flight. Lastly, collaborative dimensions of the identified affordances are discussed.
@article{steinbrinkSmartphoneICTUse2025,
title = {Smartphone and {ICT} {Use} {Among} {Ukrainian} {Refugees}: {Technology} {Support} during {War}, {Flight}, and {Adaptation} in {Germany}},
abstract = {In conflict-ridden environments, timely and accurate information is critical for those dealing with the dynamic of events. When individuals have to flee, it becomes evident that refugees frequently rely on information and communication technologies (ICT) for information acquisition, travel coordination, and maintaining connections with related parties. Based on 17 interviews, this research explores how Ukrainian refugees, who sought protection in Germany due to the 2022 Russian full-scale invasion, use ICT before, during, and after their flight. By providing empirical findings, the results show in depth how contextual factors, such as infrastructural instability, privacy concerns and an advanced digitalization, interrelate with user behaviors. Analyzing the multifaceted civilian ICT use in the context of war and flight, this exploratory research contributes to the existing research on HCI in migration contexts and connects to several topics of CSCW. By contrasting case specifics, this work highlights what makes Ukraine a special case in this research area. Furthermore, this paper examines both existing and emerging affordances of ICT in the context of flight, and identifies the crucial role of messenger groups for information gathering in all phases of the flight. Lastly, collaborative dimensions of the identified affordances are discussed.},
number = {CSCW},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Steinbrink, Enno and Guntrum, Laura and Reuter, Christian},
year = {2025},
note = {Place: New York, NY, USA
Publisher: Association for Computing Machinery},
keywords = {Crisis, UsableSec, A-Paper, Ranking-CORE-A, Projekt-GRKPrivacy, Projekt-TraCe, Projekt-ATHENE},
}
[BibTeX]
@book{schmidGoverningInSecuritySociotechnical2025a,
address = {Darmstadt, Germany},
title = {Governing ({In}){Security}: {Socio}-technical {Interactions} in {International} {Relations}},
publisher = {Dissertation (Dr. phil.), Department of History and Social Sciences, Technische Universität Darmstadt},
author = {Schmid, Stefka},
year = {2025},
keywords = {Crisis, Peace, Projekt-TraCe, Projekt-NEBULA, Dissertation},
}
[BibTeX] [Abstract]
China, the United States, and the European Union have spoken of a global competition surrounding Artificial Intelligence (AI). There is widespread talk of an ‘AI Arms Race’. But what is the nature of this race? We argue that the arms race metaphor does not capture the dynamics of global competition in the AI sector. Instead, we propose the notion of a ‘geopolitical innovation race’ for technological leadership in a networked global economy. Based on an analysis of government documents, we find that actors (1) are open to both zero-sum or positive-sum approaches in AI development, (2) organise actor networks differently based on national innovation cultures, (3) prioritise economics and status next to security concerns, and (4) are open to how AI should be interpreted. Referring to the competitive race of AI research and development, the three technopoles perpetuate the geopoliticisation of innovation and intertwine security and economic interests.
@article{schmidArmsRaceInnovation2025,
title = {Arms {Race} or {Innovation} {Race}? {Geopolitical} {AI} {Development}},
abstract = {China, the United States, and the European Union have spoken of a global competition surrounding Artificial Intelligence (AI). There is widespread talk of an ‘AI Arms Race’. But what is the nature of this race? We argue that the arms race metaphor does not capture the dynamics of global competition in the AI sector. Instead, we propose the notion of a ‘geopolitical innovation race’ for technological leadership in a networked global economy. Based on an analysis of government documents, we find that actors (1) are open to both zero-sum or positive-sum approaches in AI development, (2) organise actor networks differently based on national innovation cultures, (3) prioritise economics and status next to security concerns, and (4) are open to how AI should be interpreted. Referring to the competitive race of AI research and development, the three technopoles perpetuate the geopoliticisation of innovation and intertwine security and economic interests.},
journal = {Geopolitics},
author = {Schmid, Stefka and Lambach, Daniel and Diehl, Carlo and Reuter, Christian},
year = {2025},
keywords = {A-Paper, Ranking-ImpactFactor, Peace, AuswahlPeace, Projekt-TraCe},
}
2024
[BibTeX] [Abstract] [Download PDF]
Die Entwicklung letaler (teil)autonomer Waffensysteme (LAWS) gewinnt zunehmend an Bedeutung. Seit 2013 wird das Thema innerhalb der UN Convention on Certain Conventional Weapons zwischen Mitgliedsstaaten, Zivilgesellschaft und Fachexpert*innen diskutiert. Während sich die Debatte zu Beginn stark mit definitorischen Fragen von LAWS auseinandersetzte, so dominieren im Forum derzeit technische und rechtliche Fragen, was sich auch im entsprechenden wissenschaftlichen Diskurs widerspiegelt. Andererseits haben auch zivilgesellschaftliche Akteure den Verhandlungsprozess wesentlich beeinflusst, nicht zuletzt die Campaign to Stop Killer Robots, welche an der Initiierung des Verhandlungsrahmens maßgeblich beteiligt war. Einer der zentralen Argumentationsstränge dieser zivilgesellschaftlichen Akteure konzentriert sich auf eine intersektionale Perspektive, die unter anderem auf Bias in Technologien und Anwendungen aufmerksam macht, und versucht, diese Perspektiven in die GGE zu LAWS einzubringen und zu stärken. Die Analyse von 51 UN-Dokumenten und Gespräche mit Expert*innen zeigen, dass – im Hinblick auf Intersektionalität – insbesondere die Konzepte Gender und Race in den GGE-Diskussionen berücksichtigt werden, wenn auch nur mit geringem Gewicht. NGOs konnten jedoch die Gesamtdebatte beeinflussen und neue Themen einbringen, indem sie an etabliertere Diskurse in der Debatte anknüpften, wie z. B. an rechtliche oder technische Diskurse.
@article{gonsiorIntersektionalePerspektiveAuf2024,
title = {Die intersektionale {Perspektive} auf letale autonome {Waffensysteme}: {Eine} {Analyse} der {Diskurse} innerhalb der {UN}-{Waffenkonvention}},
issn = {1866-2196},
url = {https://doi.org/10.1007/s12399-024-00999-3},
doi = {10.1007/s12399-024-00999-3},
abstract = {Die Entwicklung letaler (teil)autonomer Waffensysteme (LAWS) gewinnt zunehmend an Bedeutung. Seit 2013 wird das Thema innerhalb der UN Convention on Certain Conventional Weapons zwischen Mitgliedsstaaten, Zivilgesellschaft und Fachexpert*innen diskutiert. Während sich die Debatte zu Beginn stark mit definitorischen Fragen von LAWS auseinandersetzte, so dominieren im Forum derzeit technische und rechtliche Fragen, was sich auch im entsprechenden wissenschaftlichen Diskurs widerspiegelt. Andererseits haben auch zivilgesellschaftliche Akteure den Verhandlungsprozess wesentlich beeinflusst, nicht zuletzt die Campaign to Stop Killer Robots, welche an der Initiierung des Verhandlungsrahmens maßgeblich beteiligt war. Einer der zentralen Argumentationsstränge dieser zivilgesellschaftlichen Akteure konzentriert sich auf eine intersektionale Perspektive, die unter anderem auf Bias in Technologien und Anwendungen aufmerksam macht, und versucht, diese Perspektiven in die GGE zu LAWS einzubringen und zu stärken. Die Analyse von 51 UN-Dokumenten und Gespräche mit Expert*innen zeigen, dass – im Hinblick auf Intersektionalität – insbesondere die Konzepte Gender und Race in den GGE-Diskussionen berücksichtigt werden, wenn auch nur mit geringem Gewicht. NGOs konnten jedoch die Gesamtdebatte beeinflussen und neue Themen einbringen, indem sie an etabliertere Diskurse in der Debatte anknüpften, wie z. B. an rechtliche oder technische Diskurse.},
journal = {Zeitschrift für Außen- und Sicherheitspolitik (ZfAS)},
author = {Gonsior, Anja-Liisa},
month = jul,
year = {2024},
keywords = {Peace, Projekt-TraCe, Projekt-ATHENE-CyAware},
}
[BibTeX] [Abstract] [Download PDF]
In crises such as the COVID-19 pandemic, it is crucial to support users when dealing with social media content. Considering digital resilience, we propose a web app based on Social Network Analysis (SNA) to provide an overview of potentially misleading vs. non-misleading content on Twitter, which can be explored by users and enable foundational learning. The latter aims at systematically identifying thematic patterns which may be associated with misleading information. Additionally, it entails reflecting on indicators of misleading tweets which are proposed to approach classification of tweets. Paying special attention to non-expert users of social media, we conducted a two-step Think Aloud study for evaluation. While participants valued the opportunity to generate new knowledge and the diversity of the application, qualities such as equality and rapidity may be further improved. However, learning effects outweighed individual costs as all users were able to shift focus onto relevant features, such as hashtags, while readily pointing out content characteristics. Our design artifact connects to learning-oriented interventions regarding the spread of misleading information and tackles information overload by a SNA-based plug-in.
@article{schmidDigitalResilienceDealing2024,
title = {Digital {Resilience} in {Dealing} with {Misinformation} on {Social} {Media} during {COVID}-19: {A} {Web} {Application} to {Assist} {Users} in {Crises}},
volume = {26},
issn = {1572-9419},
url = {https://doi.org/10.1007/s10796-022-10347-5},
doi = {10.1007/s10796-022-10347-5},
abstract = {In crises such as the COVID-19 pandemic, it is crucial to support users when dealing with social media content. Considering digital resilience, we propose a web app based on Social Network Analysis (SNA) to provide an overview of potentially misleading vs. non-misleading content on Twitter, which can be explored by users and enable foundational learning. The latter aims at systematically identifying thematic patterns which may be associated with misleading information. Additionally, it entails reflecting on indicators of misleading tweets which are proposed to approach classification of tweets. Paying special attention to non-expert users of social media, we conducted a two-step Think Aloud study for evaluation. While participants valued the opportunity to generate new knowledge and the diversity of the application, qualities such as equality and rapidity may be further improved. However, learning effects outweighed individual costs as all users were able to shift focus onto relevant features, such as hashtags, while readily pointing out content characteristics. Our design artifact connects to learning-oriented interventions regarding the spread of misleading information and tackles information overload by a SNA-based plug-in.},
number = {2},
journal = {Information Systems Frontiers (ISF)},
author = {Schmid, Stefka and Hartwig, Katrin and Cieslinski, Robert and Reuter, Christian},
month = apr,
year = {2024},
keywords = {Crisis, Student, A-Paper, Projekt-TraCe, Projekt-NEBULA},
pages = {477--499},
}
[BibTeX] [Abstract] [Download PDF]
Technological and scientific progress, especially the rapid development in information technology (IT) and artificial intelligence (AI), plays a crucial role regarding questions of peace and security. This textbook, extended and updated in its second edition, addresses the significance, potential of IT, as well as the challenges it poses, with regard to peace and security. It introduces the reader to the concepts of peace, conflict, and security research, especially focusing on natural, technical and computer science perspectives. In the following sections, it sheds light on cyber conflicts, war and peace, cyber arms control, cyber attribution, infrastructures, artificial intelligence, as well ICT in peace and conflict.
@book{reuterInformationTechnologyPeace2024,
address = {Wiesbaden, Germany},
edition = {2},
title = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
isbn = {978-3-658-44809-7},
url = {https://doi.org/10.1007/978-3-658-44810-3},
abstract = {Technological and scientific progress, especially the rapid development in information technology (IT) and artificial intelligence (AI), plays a crucial role regarding questions of peace and security. This textbook, extended and updated in its second edition, addresses the significance, potential of IT, as well as the challenges it poses, with regard to peace and security.
It introduces the reader to the concepts of peace, conflict, and security research, especially focusing on natural, technical and computer science perspectives. In the following sections, it sheds light on cyber conflicts, war and peace, cyber arms control, cyber attribution, infrastructures, artificial intelligence, as well ICT in peace and conflict.},
publisher = {Springer Vieweg},
author = {Reuter, Christian},
year = {2024},
keywords = {Selected, Security, Peace, Infrastructure, Projekt-CROSSING, AuswahlPeace, Cyberwar, Projekt-TraCe},
}
[BibTeX] [Abstract] [Download PDF]
Die Konferenz Science · Peace · Security ’23 fand vom 20. bis 22. September 2023 an der Technischen Universität Darmstadt statt. Sie widmete sich dem Wandel von Technologien, deren Rolle in Kriegen und Konflikten sowie Fragen der Rüstungskontrolle. Ausgerichtet wurde die englischsprachige Konferenz von TraCe, einem hessischen BMBF-Forschungsverbund zu Transformationen politischer Gewalt, vom DFG-Sonderforschungsbereich CROSSING zu kryptografiebasierten Sicherheitslösungen und vom Forschungsverbund Naturwissenschaft, Abrüstung und internationale Sicherheit FONAS. Der Krieg Russlands gegen die Ukraine macht die Bedeutung der Friedens- und Konfliktforschung und deren technische Dimension, unter anderem, offensichtlich. Bereits 2019 hat der Wissenschaftsrat als wichtigstes wissenschaftspolitisches Beratungsgremium in Deutschland seine Empfehlungen zur Weiterentwicklung der Friedens- und Konfliktforschung veröffentlicht. Darin weist er auf einen dringenden Handlungsbedarf zur Stärkung der naturwissenschaftlich-technischen Friedens- und Konfliktforschung hin. Die Konferenzreihe Science · Peace · Security möchte einen kleinen Beitrag dazu leisten. Sie wurde 2019 in Darmstadt gegründet, fand 2021 an der RWTH Aachen statt, und soll 2025 am Forschungszentrum Jülich stattfinden.
@techreport{reuterTechnologieUndTransformation2024,
address = {Wissenschaft und Frieden},
title = {{Technologie} und die {Transformation} {Politischer} {Gewalt}},
url = {http://www.peasec.de/paper/2024/2024_ReuterRiebeGuntrum_TechnologieTransformationPolitischeGewalt_WundF.pdf},
abstract = {Die Konferenz Science · Peace · Security ’23 fand vom 20. bis 22. September 2023 an der Technischen Universität Darmstadt statt. Sie widmete sich dem Wandel von Technologien, deren Rolle in Kriegen und Konflikten sowie Fragen der Rüstungskontrolle. Ausgerichtet wurde die englischsprachige Konferenz von TraCe, einem hessischen BMBF-Forschungsverbund zu Transformationen politischer Gewalt, vom DFG-Sonderforschungsbereich CROSSING zu kryptografiebasierten Sicherheitslösungen und vom Forschungsverbund Naturwissenschaft, Abrüstung und internationale Sicherheit FONAS.
Der Krieg Russlands gegen die Ukraine macht die Bedeutung der Friedens- und Konfliktforschung und deren technische Dimension, unter anderem, offensichtlich. Bereits 2019 hat der Wissenschaftsrat als wichtigstes wissenschaftspolitisches Beratungsgremium in Deutschland seine Empfehlungen zur Weiterentwicklung der Friedens- und Konfliktforschung veröffentlicht. Darin weist er auf einen dringenden Handlungsbedarf zur Stärkung der naturwissenschaftlich-technischen Friedens- und Konfliktforschung hin. Die Konferenzreihe Science · Peace · Security möchte einen kleinen Beitrag dazu leisten. Sie wurde 2019 in Darmstadt gegründet, fand 2021 an der RWTH Aachen statt, und soll 2025 am Forschungszentrum Jülich stattfinden.},
author = {Reuter, Christian and Riebe, Thea and Guntrum, Laura},
year = {2024},
keywords = {Peace, Projekt-TraCe},
}
[BibTeX] [Abstract] [Download PDF]
Amidst the ongoing anti-military protests in Myanmar since 2021, there is a noticeable research gap on ICT-supported activism. Generally, ICTs play an important role during political crises in conjunction with activists’ practices on the ground. Inspired by Resource Mobilization Theory, I conducted qualitative interviews (N=16) and a qualitative online survey (N=34), which demonstrate the intersection between analog and digital domains, showcasing the ingenuity of the activists, and the rapid adoption of ICTs in a country that has experienced a digital revolution within the last few years. As not all people were able to protest on-the-ground, they acted as keyboard fighters to organize protests, to share information, and to support the civil disobedience movement in Myanmar. The study identifies, inter alia, the need for better offline applications with wider coverage in times of internet shutdowns, applications that cannot be easily identified during physical controls, and providing free and secure VPN access.
@inproceedings{guntrumKeyboardFightersUse2024,
address = {New York, NY, USA},
series = {{CHI} '24},
title = {Keyboard {Fighters}: {The} {Use} of {ICTs} by {Activists} in {Times} of {Military} {Coup} in {Myanmar}},
isbn = {9798400703300},
url = {https://doi.org/10.1145/3613904.3642279},
doi = {10.1145/3613904.3642279},
abstract = {Amidst the ongoing anti-military protests in Myanmar since 2021, there is a noticeable research gap on ICT-supported activism. Generally, ICTs play an important role during political crises in conjunction with activists’ practices on the ground. Inspired by Resource Mobilization Theory, I conducted qualitative interviews (N=16) and a qualitative online survey (N=34), which demonstrate the intersection between analog and digital domains, showcasing the ingenuity of the activists, and the rapid adoption of ICTs in a country that has experienced a digital revolution within the last few years. As not all people were able to protest on-the-ground, they acted as keyboard fighters to organize protests, to share information, and to support the civil disobedience movement in Myanmar. The study identifies, inter alia, the need for better offline applications with wider coverage in times of internet shutdowns, applications that cannot be easily identified during physical controls, and providing free and secure VPN access.},
booktitle = {Proceedings of the {CHI} {Conference} on {Human} {Factors} in {Computing} {Systems}},
publisher = {Association for Computing Machinery},
author = {Guntrum, Laura},
year = {2024},
keywords = {HCI, Selected, A-Paper, Ranking-CORE-A*, Peace, Projekt-TraCe, Projekt-ATHENE},
}
[BibTeX] [Abstract] [Download PDF]
In conflict-affected settings, activists use Information and Communication Technologies (ICTs) to attract international attention to their cause and stay informed about events. However, digital violence is a growing global concern. Perpetrators are often anonymous, making effective recourse difficult, and legal frameworks are often inadequate. Drawing on case studies of activists in Cameroon, Colombia, and Myanmar, this TraCe policy brief aims to (1) outline the challenges posed by increasing digital violence against activists and (2) identify how policymakers worldwide might respond to this issue.
@misc{guntrumInternetShutdownsPersonal2024,
title = {From {Internet} {Shutdowns} to {Personal} {Harassment}: {Examining} the {Spectrum} of {Digital} {Violence} {Against} {Social} {Activist}},
url = {https://www.trace-center.de/fileadmin/DatenTrace/Publikationen/TraCePB2404_Digital_Violence.pdf},
abstract = {In conflict-affected settings, activists use Information and Communication Technologies (ICTs) to attract international attention to their cause and stay informed about events. However, digital violence is a growing global concern. Perpetrators are often anonymous, making effective recourse difficult, and legal frameworks are often inadequate. Drawing on case studies of activists in Cameroon, Colombia, and Myanmar, this TraCe policy brief aims to (1) outline the challenges posed by increasing digital violence against activists and (2) identify how policymakers worldwide might respond to this issue.},
urldate = {2024-04-15},
publisher = {TraCe Policy Brief No. 4},
author = {Guntrum, Laura and Reuter, Christian},
year = {2024},
doi = {10.48809/PRIFTraCePB2404.},
keywords = {Peace, Projekt-TraCe},
}
[BibTeX] [Abstract] [Download PDF]
This article examines how Colombian NGOs use Information and Communication Technologies (ICTs) for peacebuilding attempts amid the COVID-19 pandemic. Drawing from 17 interviews with NGO members, the study underscores the pivotal role of digital peacebuilding in sustaining and expanding peace attempts, effective data management, and a broader engagement of target groups beyond in-person activities often associated with safety and financial concerns. The findings also identify prevailing challenges of incorporating ICTs in NGO’s peacebuilding activities, ranging from privacy-related concerns to connectivity issues. The article points out the potential for NGOs to enhance interactivity, knowledge transfer, and to diversify their activities, including IT-security training and awareness campaigns on hate speech and propaganda. It also emphasizes the importance of developing risk reduction strategies tailored to the specific needs of different target groups.
@article{guntrumNavigatingPandemicTechnology2024,
title = {Navigating the {Pandemic} through {Technology}: {Colombian} {NGOs} {Promoting} {Peace} during the {COVID}-19 era},
url = {https://peasec.de/paper/2024/2024_GuntrumCerrilloReuter_NavigatingPanedemicThroughTechnology_PeaceDev.pdf},
doi = {10.1177/15423166241293856},
abstract = {This article examines how Colombian NGOs use Information and Communication Technologies (ICTs) for peacebuilding attempts amid the COVID-19 pandemic. Drawing from 17 interviews with NGO members, the study underscores the pivotal role of digital peacebuilding in sustaining and expanding peace attempts, effective data management, and a broader engagement of target groups beyond in-person activities often associated with safety and financial concerns. The findings also identify prevailing challenges of incorporating ICTs in NGO's peacebuilding activities, ranging from privacy-related concerns to connectivity issues. The article points out the potential for NGOs to enhance interactivity, knowledge transfer, and to diversify their activities, including IT-security training and awareness campaigns on hate speech and propaganda. It also emphasizes the importance of developing risk reduction strategies tailored to the specific needs of different target groups.},
journal = {Peacebuilding \& Development},
author = {Guntrum, Laura and Cerrillo, Sofía and Reuter, Christian},
year = {2024},
keywords = {Student, Peace, Projekt-TraCe},
}
[BibTeX] [Abstract] [Download PDF]
With developments in Artificial Intelligence widely framed as security concern in both military and civilian realms, governments have turned their attention to regulating and governing AI. In a study of US, Chinese, and EU AI documents, we go beyond instrumental understandings of AI as a technological capability, which serves states‘ self-interests and the maintenance of their (supra)national security. Our specific interest lies in how AI policies tap into both problem-solving approaches and affective registers to achieve both physical as well as ontological security. We find that in governmental visions, AI is perceived as a capability that enhances societal, and geopolitical interests while its risks are framed as manageable. This echoes strands within Human-Computer Interaction that draw on human-centered perceptions of technology and assumptions about human-AI relationships of trust. Despite different cultural and institutional settings, the visions of future AI development are shaped by this (shared) understanding of human-AI interaction, offering common ground in the navigation of innovation policies.
@article{schmidTrustArtificialIntelligence2024,
title = {Trust in {Artificial} {Intelligence}: {Producing} {Ontological} {Security} through {Governmental} {Visions}},
url = {https://doi.org/10.1177/00108367241288073},
doi = {10.1177/00108367241288073},
abstract = {With developments in Artificial Intelligence widely framed as security concern in both military and civilian realms, governments have turned their attention to regulating and governing AI. In a study of US, Chinese, and EU AI documents, we go beyond instrumental understandings of AI as a technological capability, which serves states' self-interests and the maintenance of their (supra)national security. Our specific interest lies in how AI policies tap into both problem-solving approaches and affective registers to achieve both physical as well as ontological security. We find that in governmental visions, AI is perceived as a capability that enhances societal, and geopolitical interests while its risks are framed as manageable. This echoes strands within Human-Computer Interaction that draw on human-centered perceptions of technology and assumptions about human-AI relationships of trust. Despite different cultural and institutional settings, the visions of future AI development are shaped by this (shared) understanding of human-AI interaction, offering common ground in the navigation of innovation policies.},
journal = {Cooperation and Conflict},
author = {Schmid, Stefka and Pham, Bao-Chau and Ferl, Anna-Katharina},
year = {2024},
keywords = {A-Paper, Ranking-ImpactFactor, Peace, AuswahlPeace, Projekt-TraCe},
}
[BibTeX] [Abstract] [Download PDF]
The development of artificial intelligence and autonomous functions in the military domain has an immense impact on technologies being developed by the private defence industry. Defence firms contribute to the narratives and visions on autonomous weapon systems and the future of warfare, e.g. in the form of strategic marketing of their products. However, their role has so far been understudied, especially regarding autonomous weapon systems. As the normative debate revolves around aspects of human control, this work examines the narratives of (meaningful) human control in the marketing of autonomous military systems by defence manufacturers. Based on a comprehensive content analysis of twenty defence firms, we identified three main narratives, which envision autonomy as a military advantage, the role of the human in the future of warfare, and human-machine teaming. Based on the results, we argue that defence companies reproduce and adapt narratives which shape expectations and visions of human control of autonomous weapon systems in anticipation of emerging norms for (meaningful) human control. However, without specifications and verification mechanisms, there is no indication that human control will be meaningful.
@article{riebeEnvisioningHumanMachineInteraction2024,
title = {Envisioning {Human}-{Machine} {Interaction} in {Future} {Warfare}: {Defence} {Industry} {Narratives} on {Human} {Control} of {Autonomous} {Weapon} {Systems}},
url = {https://doi.org/10.1080/13600826.2024.2436966},
doi = {10.1080/13600826.2024.2436966},
abstract = {The development of artificial intelligence and autonomous functions in the military domain has an immense impact on technologies being developed by the private defence industry. Defence firms contribute to the narratives and visions on autonomous weapon systems and the future of warfare, e.g. in the form of strategic marketing of their products. However, their role has so far been understudied, especially regarding autonomous weapon systems. As the normative debate revolves around aspects of human control, this work examines the narratives of (meaningful) human control in the marketing of autonomous military systems by defence manufacturers. Based on a comprehensive content analysis of twenty defence firms, we identified three main narratives, which envision autonomy as a military advantage, the role of the human in the future of warfare, and human-machine teaming. Based on the results, we argue that defence companies reproduce and adapt narratives which shape expectations and visions of human control of autonomous weapon systems in anticipation of emerging norms for (meaningful) human control. However, without specifications and verification mechanisms, there is no indication that human control will be meaningful.},
journal = {Global Society},
author = {Riebe, Thea and Gonsior, Anja-Liisa and Reichert, Lilian and Reuter, Christian},
year = {2024},
keywords = {HCI, Student, A-Paper, Ranking-ImpactFactor, Peace, AuswahlPeace, Projekt-TraCe, Projekt-ATHENE-CyAware},
}
[BibTeX] [Abstract] [Download PDF]
This special interest group invites participants to critically examine the complex interplay between interventionist Information and Communication Technology (ICT) projects and (historical) contexts of conflict and colonialism. It aims to open conversations on the multitude of challenges, barriers, and lessons learned around South-North collaborations, particularly in contexts with a colonial past and present, including researchers and research participants safety, data „security“, applied ethics, and methodologies. This SIG aims at jointly developing ideas on how we, as academic researchers, can navigate and reframe the power dynamics inherent in global South-North collaborations.
@inproceedings{rullerCollaborationParadoxConfronting2024,
address = {New York, NY, USA},
series = {{CSCW} {Companion} '24},
title = {The {Collaboration} {Paradox}: {Confronting} {Colonial} {Legacies} in {South}-{North} {Projects}},
isbn = {9798400711145},
url = {https://doi.org/10.1145/3678884.3687138},
doi = {10.1145/3678884.3687138},
abstract = {This special interest group invites participants to critically examine the complex interplay between interventionist Information and Communication Technology (ICT) projects and (historical) contexts of conflict and colonialism. It aims to open conversations on the multitude of challenges, barriers, and lessons learned around South-North collaborations, particularly in contexts with a colonial past and present, including researchers and research participants safety, data "security", applied ethics, and methodologies. This SIG aims at jointly developing ideas on how we, as academic researchers, can navigate and reframe the power dynamics inherent in global South-North collaborations.},
booktitle = {Companion {Publication} of the 2024 {Conference} on {Computer}-{Supported} {Cooperative} {Work} and {Social} {Computing}},
publisher = {Association for Computing Machinery},
author = {Rüller, Sarah and Aal, Konstantin "Kosta" and Guntrum, Laura and Talhouk, Reem and Lazem, Shaimaa and Wulf, Volker and Randall, Dave},
year = {2024},
note = {event-place: San Jose, Costa Rica},
keywords = {Peace, Projekt-TraCe},
pages = {669--671},
}
2023
[BibTeX] [Abstract] [Download PDF]
Like past crises, the COVID-19 pandemic has also activated individual volunteers to help to respond to the crisis. This includes digital volunteers, who have organized physical aid and conducted activities on social media. Analyzing German volunteering support groups on Facebook and related Reddit threads in the context of the COVID-19 pandemic, we {\textbackslash}updatedshow what type of help is offered and how social media users interact with each other, trying to cope with the situation. We reveal that most users offering help online conduct mostly typical care work, such as buying groceries or giving advice. Crucially, volunteering is characterized by relationships of care and thus builds on affirmative interactions. Albeit some misdirected offers and regressive interruptions, people use the possibility to make their voices heard and, showing empathy, help each other to cope with crisis. Social media like Facebook mediate societal structures, including relationships of care, offering a space for continuous, cumulatively resilient conduct of care work. Reflecting on the traditional division of labor in crisis volunteering and counter-productive dynamics of care and empathy, we aim for feminist ethics of care which allows for interactions on social media that foster generative computer-supported collaboration.
@article{schmidDigitalVolunteersCOVID192023,
title = {Digital {Volunteers} {During} the {COVID}-19 {Pandemic}: {Care} {Work} on {Social} {Media} for {Socio}-technical {Resilience}},
volume = {3},
issn = {2748-5625},
url = {https://ojs.weizenbaum-institut.de/index.php/wjds/article/view/78},
doi = {10.34669/WI.WJDS/3.3.6},
abstract = {Like past crises, the COVID-19 pandemic has also activated individual volunteers to help to respond to the crisis. This includes digital volunteers, who have organized physical aid and conducted activities on social media. Analyzing German volunteering support groups on Facebook and related Reddit threads in the context of the COVID-19 pandemic, we {\textbackslash}updatedshow what type of help is offered and how social media users interact with each other, trying to cope with the situation. We reveal that most users offering help online conduct mostly typical care work, such as buying groceries or giving advice. Crucially, volunteering is characterized by relationships of care and thus builds on affirmative interactions. Albeit some misdirected offers and regressive interruptions, people use the possibility to make their voices heard and, showing empathy, help each other to cope with crisis. Social media like Facebook mediate societal structures, including relationships of care, offering a space for continuous, cumulatively resilient conduct of care work. Reflecting on the traditional division of labor in crisis volunteering and counter-productive dynamics of care and empathy, we aim for feminist ethics of care which allows for interactions on social media that foster generative computer-supported collaboration.},
number = {1},
journal = {Weizenbaum Journal of the Digital Society},
author = {Schmid, Stefka and Guntrum, Laura and Haesler, Steffen and Schultheiß, Lisa and Reuter, Christian},
month = may,
year = {2023},
keywords = {Crisis, HCI, SocialMedia, Student, Peace, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Projekt-TraCe},
}
[BibTeX] [Abstract] [Download PDF]
Given the lack of empirical examples of how research can be conducted via digital means in sensitive contexts, this paper provides a threat model using Afghanistan, where the Taliban took power in August 2021, as an example. Both technical and non-technical research-related risks are analyzed, paying attention to research ethics, data security, and privacy. We argue that any threat model and risk analysis is highly context-dependent. Our analysis reveals that in certain research processes, human security does not necessarily coincide with data security and that an ambivalence exists between privacy and usability. In addition to the concrete threat analysis, the paper identifies some general technical solutions (e.g., encryption methods, communication software) for different research steps to foster secure and ethically justifiable research.
@article{guntrumUsingDigitallyMediated2023,
title = {Using {Digitally} {Mediated} {Methods} in {Sensitive} {Contexts}: {A} {Threat} {Analysis} and {Critical} {Reflection} on {Security}, {Privacy}, and {Ethical} {Concerns} in the {Case} of {Afghanistan}},
volume = {11},
issn = {2524-6976},
url = {https://link.springer.com/article/10.1007/s42597-022-00088-2},
doi = {10.1007/s42597-022-00088-2},
abstract = {Given the lack of empirical examples of how research can be conducted via digital means in sensitive contexts, this paper provides a threat model using Afghanistan, where the Taliban took power in August 2021, as an example. Both technical and non-technical research-related risks are analyzed, paying attention to research ethics, data security, and privacy. We argue that any threat model and risk analysis is highly context-dependent. Our analysis reveals that in certain research processes, human security does not necessarily coincide with data security and that an ambivalence exists between privacy and usability. In addition to the concrete threat analysis, the paper identifies some general technical solutions (e.g., encryption methods, communication software) for different research steps to foster secure and ethically justifiable research.},
number = {2},
journal = {Zeitschrift für Friedens- und Konfliktforschung (ZeFKo)},
author = {Guntrum, Laura and Güldenring, Benjamin and Kuntke, Franz and Reuter, Christian},
month = oct,
year = {2023},
keywords = {Peace, Projekt-ATHENE-FANCY, Projekt-TraCe},
pages = {95--128},
}
[BibTeX] [Abstract] [Download PDF]
Der Überfall Russlands auf die Ukraine und der sich anschließende Krieg haben neben vielen anderen sicherheitspolitischen Gewissheiten auch zum ersten Mal die Rolle des Cyberspace in einem offenen Angriffskrieg demonstriert und bedenkenswerte Entwicklungen offenbart. Ziel dieses Beitrags ist es, die militärischen Aktivitäten im Cyberspace im Rahmen des Krieges Russlands gegen die Ukraine auf der Grundlage der öffentlich verfügbaren Informationen zu analysieren und im Hinblick auf die bis dato gängigen Vorstellungen eines Cyberwars zu bewerten. Darauf aufbauend werden mögliche Schlussfolgerungen betrachtet, zum einen mit Blick auf die zukünftige Bedeutung von Cyberaktivitäten für Russland, hinsichtlich des generellen militärischen Einsatzes von Cyberwirkmitteln und dessen weiterer Entwicklung, und in Bezug auf zukünftige internationale Debatten zur Einhegung von Cyberwars und des schädigenden Einsatzes von Cyberwirkmitteln.
@article{reinholdZurDebatteUber2023,
title = {Zur {Debatte} über die {Einhegung} eines {Cyberwars}: {Analyse} militärischer {Cyberaktivitäten} im {Krieg} {Russlands} gegen die {Ukraine}},
issn = {2524-6976},
url = {https://doi.org/10.1007/s42597-023-00094-y},
doi = {10.1007/s42597-023-00094-y},
abstract = {Der Überfall Russlands auf die Ukraine und der sich anschließende Krieg haben neben vielen anderen sicherheitspolitischen Gewissheiten auch zum ersten Mal die Rolle des Cyberspace in einem offenen Angriffskrieg demonstriert und bedenkenswerte Entwicklungen offenbart. Ziel dieses Beitrags ist es, die militärischen Aktivitäten im Cyberspace im Rahmen des Krieges Russlands gegen die Ukraine auf der Grundlage der öffentlich verfügbaren Informationen zu analysieren und im Hinblick auf die bis dato gängigen Vorstellungen eines Cyberwars zu bewerten. Darauf aufbauend werden mögliche Schlussfolgerungen betrachtet, zum einen mit Blick auf die zukünftige Bedeutung von Cyberaktivitäten für Russland, hinsichtlich des generellen militärischen Einsatzes von Cyberwirkmitteln und dessen weiterer Entwicklung, und in Bezug auf zukünftige internationale Debatten zur Einhegung von Cyberwars und des schädigenden Einsatzes von Cyberwirkmitteln.},
journal = {Zeitschrift für Friedens- und Konfliktforschung (ZeFKo)},
author = {Reinhold, Thomas and Reuter, Christian},
month = mar,
year = {2023},
keywords = {Security, Peace, Projekt-ATHENE-SecUrban, Projekt-TraCe},
}
[BibTeX] [Abstract] [Download PDF]
The article examines which technical aspects of autonomous driving are potentially transferable to the military sector. Through expert interviews the strong fragmentation of technologies in the field of autonomous driving becomes apparent. This hinders the clear identification of a specific dual-use technology. Environmental perception, artificial intelligence and sensors are considered to have the highest transferability rate from civil research to the military sector. Therefore, sensor development should receive special attention.
@article{guntrumDualUseTechnologiesContext2023,
title = {Dual-{Use} {Technologies} in the {Context} of {Autonomous} {Driving}: {An} {Empirical} {Case} {Study} {From} {Germany}},
issn = {1866-2196},
url = {https://doi.org/10.1007/s12399-022-00935-3},
doi = {10.1007/s12399-022-00935-3},
abstract = {The article examines which technical aspects of autonomous driving are potentially transferable to the military sector. Through expert interviews the strong fragmentation of technologies in the field of autonomous driving becomes apparent. This hinders the clear identification of a specific dual-use technology. Environmental perception, artificial intelligence and sensors are considered to have the highest transferability rate from civil research to the military sector. Therefore, sensor development should receive special attention.},
journal = {Zeitschrift für Außen- und Sicherheitspolitik (ZfAS)},
author = {Guntrum, Laura and Schwartz, Sebastian and Reuter, Christian},
month = jan,
year = {2023},
keywords = {Peace, Projekt-ATHENE-SecUrban, Projekt-TraCe},
}
[BibTeX] [Abstract] [Download PDF]
Safety-critical human-computer interaction has focused on technology use in life-critical situations, including military operations. Due to the practical relevance of HCI and disciplinary debates about human-centered design, this literature review studies HCI scholarships’ visions of military human-computer interaction. Through text analysis and categorization of publications, it is found that interaction is envisioned to take place in the context of both missionoriented operational (e.g., target detection) as well as organizational tasks (e.g., military training). While artificial intelligence, virtual/augmented reality, and robots are most frequently defined as technological environments, goals, such as situation awareness, enjoyment, and trust are predominantly associated with them. Considering scholarly references to application contexts and different factors of the context of use allows to systematically approach how military human-computer interaction is imagined. Offering insight into research trends in HCI, this first overview of research endeavors also contributes to interdisciplinary debates, such as Security Studies and technology assessment.
@inproceedings{schmidSafeSecureVisions2023,
address = {Rapperswil, Switzerland},
title = {Safe and {Secure}? {Visions} of {Military} {Human}-{Computer} {Interaction}},
url = {https://dl.gi.de/items/841cc5bd-8e25-40de-804f-8fb4fedddf11},
doi = {10.18420/muc2023-mci-ws01-365},
abstract = {Safety-critical human-computer interaction has focused on technology use in life-critical situations, including military operations. Due to the practical relevance of HCI and disciplinary debates about human-centered design, this literature review studies HCI scholarships’ visions of military human-computer interaction. Through text analysis and categorization of publications, it is found that interaction is envisioned to take place in the context of both missionoriented operational (e.g., target detection) as well as organizational tasks (e.g., military training). While artificial intelligence, virtual/augmented reality, and robots are most frequently defined as technological environments, goals, such as situation awareness, enjoyment, and trust are predominantly associated with them. Considering scholarly references to application contexts and different factors of the context of use allows to systematically approach how military human-computer interaction is imagined. Offering insight into research trends in HCI, this first overview of research endeavors also contributes to interdisciplinary debates, such as Security Studies and technology assessment.},
language = {de},
booktitle = {Mensch und {Computer} 2023 - {Workshopband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Schmid, Stefka},
year = {2023},
keywords = {Peace, Projekt-ATHENE-SecUrban, Projekt-TraCe},
}
[BibTeX] [Abstract] [Download PDF]
The conference Science · Peace · Security ’23 took place from September 20 to 22, 2023, at the Georg-Christoph-Lichtenberg-Haus of the Technical University of Darmstadt. It focused on the transformation of technologies, their role in wars and conflicts, and issues related to arms control. The three-day scientific conference welcomed over 110 participants from Germany and speakers from the United Kingdom, Sweden, the USA, Colombia, India, Italy, Switzerland, Norway, the Czech Republic, Iraq, Austria, and the Netherlands. More than 50 different organizations were represented, ensuring interdisciplinary exchange. The program covered a wide range of topics reflecting societal discourses in light of a changing global security landscape. In total, the conference featured 40 presentations, workshops, discussions, and panels that discussed current and future challenges in the field of technical peace and conflict research. Particularly relevant topics included: Artificial Intelligence, Unmanned Weapons Systems, Rocket and Space Technologies (Nuclear) Arms Control, Regulation of Biological and Chemical Weapons, Information Technologies for Surveillance and Oppression of Civilians, (Civilian) Critical Infrastructures, Digital Peacebuilding, Human-Machine Interaction, Dual-Used, Cyber Attacks and Relevant Technology and Security Policies.
@book{reuterSciencePeaceSecurity2023,
address = {Darmstadt, Germany},
title = {Science {Peace} {Security} ‘23 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/24777},
abstract = {The conference Science · Peace · Security '23 took place from September 20 to 22, 2023, at the Georg-Christoph-Lichtenberg-Haus of the Technical University of Darmstadt. It focused on the transformation of technologies, their role in wars and conflicts, and issues related to arms control. The three-day scientific conference welcomed over 110 participants from Germany and speakers from the United Kingdom, Sweden, the USA, Colombia, India, Italy, Switzerland, Norway, the Czech Republic, Iraq, Austria, and the Netherlands. More than 50 different organizations were represented, ensuring interdisciplinary exchange. The program covered a wide range of topics reflecting societal discourses in light of a changing global security landscape. In total, the conference featured 40 presentations, workshops, discussions, and panels that discussed current and future challenges in the field of technical peace and conflict research. Particularly relevant topics included: Artificial Intelligence, Unmanned Weapons Systems, Rocket and Space Technologies (Nuclear) Arms Control, Regulation of Biological and Chemical Weapons, Information Technologies for Surveillance and Oppression of Civilians, (Civilian) Critical Infrastructures, Digital Peacebuilding, Human-Machine Interaction, Dual-Used, Cyber Attacks and Relevant Technology and Security Policies.},
publisher = {TUprints},
author = {Reuter, Christian and Riebe, Thea and Guntrum, Laura},
year = {2023},
doi = {10.26083/tuprints-00024777},
keywords = {Security, Peace, Projekt-CROSSING, Projekt-TraCe},
}
[BibTeX] [Abstract] [Download PDF]
The conference Science · Peace · Security ’23 took place from September 20 to 22, 2023, at the Georg-Christoph-Lichtenberg-Haus of the Technical University of Darmstadt. It focused on the transformation of technologies, their role in wars and conflicts, and issues related to arms control. The three-day scientific conference welcomed over 110 participants from Germany and speakers from the United Kingdom, Sweden, the USA, Colombia, India, Italy, Switzerland, Norway, the Czech Republic, Iraq, Austria, and the Netherlands. More than 50 different organizations were represented, ensuring interdisciplinary exchange. The program covered a wide range of topics reflecting societal discourses in light of a changing global security landscape. In total, the conference featured 40 presentations, workshops, discussions, and panels that discussed current and future challenges in the field of technical peace and conflict research. Particularly relevant topics included: Artificial Intelligence, Unmanned Weapons Systems, Rocket and Space Technologies (Nuclear) Arms Control, Regulation of Biological and Chemical Weapons, Information Technologies for Surveillance and Oppression of Civilians, (Civilian) Critical Infrastructures, Digital Peacebuilding, Human-Machine Interaction, Dual-Used, Cyber Attacks and Relevant Technology and Security Policies.
@incollection{reuterSciencePeaceSecurity2023a,
address = {Darmstadt, Germany},
title = {Science {Peace} {Security} ’23: {Editorial} of the {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/24777},
abstract = {The conference Science · Peace · Security '23 took place from September 20 to 22, 2023, at the Georg-Christoph-Lichtenberg-Haus of the Technical University of Darmstadt. It focused on the transformation of technologies, their role in wars and conflicts, and issues related to arms control. The three-day scientific conference welcomed over 110 participants from Germany and speakers from the United Kingdom, Sweden, the USA, Colombia, India, Italy, Switzerland, Norway, the Czech Republic, Iraq, Austria, and the Netherlands. More than 50 different organizations were represented, ensuring interdisciplinary exchange. The program covered a wide range of topics reflecting societal discourses in light of a changing global security landscape. In total, the conference featured 40 presentations, workshops, discussions, and panels that discussed current and future challenges in the field of technical peace and conflict research. Particularly relevant topics included: Artificial Intelligence, Unmanned Weapons Systems, Rocket and Space Technologies (Nuclear) Arms Control, Regulation of Biological and Chemical Weapons, Information Technologies for Surveillance and Oppression of Civilians, (Civilian) Critical Infrastructures, Digital Peacebuilding, Human-Machine Interaction, Dual-Used, Cyber Attacks and Relevant Technology and Security Policies.},
booktitle = {Science {Peace} {Security} ’23: {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
publisher = {TUprints},
author = {Reuter, Christian and Riebe, Thea and Guntrum, Laura},
editor = {Reuter, Christian and Riebe, Thea and Guntrum, Laura},
year = {2023},
doi = {10.26083/tuprints-00024777},
keywords = {Security, Peace, Projekt-CROSSING, Projekt-TraCe},
pages = {9--13},
}
2022
[BibTeX] [Abstract] [Download PDF]
In the digital age, the vision of autonomous vehicles (AVs) is vibrant. Research is being conducted worldwide to inte-grate AVs into our everyday lives in the future, spending consid-erable amounts of money in the development process. Actors from both engineering as well as social sciences are involved in this re-search, with technical disciplines strongly dominating. In addition to perceived progress of numerous newly developed technologies such as AVs, challenges should also be referred to. According to research analysis, the transferability of autonomous cars to the military sphere seems to be frequently forgotten or ignored (dual-use). Since not much research has been conducted in Germany on the potential deployment of autonomous driving development steps into military domains, 25 semi-structured interviews with de-velopers and researchers and actors involved in the field, were conducted in 2020. The paper identifies that the majority of re-spondents interviewed were aware of general existing dual-use de-bates, however, few had reflected about dual-use issues regarding a possible transfer of their own development processes in the con-text of autonomous driving to military applications, intensively. One reason is the small-scale nature of research, another is the complexity of the field, which enables the engineer’s alienation from their responsibility for the artefacts’ use. Moreover, it has become clear that hardly any conversations among colleagues oc-cur about possible misuse and that no standardized policy guide-lines exist, which provide information about possible risk. To raise dual-use awareness, scientific contributions, risk education, and interdisciplinary discussions are essential.
@article{schwartzVisionThreatAwareness2022,
title = {Vision or {Threat} – {Awareness} for {Dual}-{Use} in the {Development} of {Autonomous} {Driving}},
volume = {3},
issn = {2637-6415},
url = {https://www.peasec.de/paper/2022/2022_SchwartzGuntrumReuter_VisionorThreatAwarenessDualUseAutonomousDriving_IEEE-TTS.pdf},
doi = {10.1109/TTS.2022.3182310},
abstract = {In the digital age, the vision of autonomous vehicles (AVs) is vibrant. Research is being conducted worldwide to inte-grate AVs into our everyday lives in the future, spending consid-erable amounts of money in the development process. Actors from both engineering as well as social sciences are involved in this re-search, with technical disciplines strongly dominating. In addition to perceived progress of numerous newly developed technologies such as AVs, challenges should also be referred to. According to research analysis, the transferability of autonomous cars to the military sphere seems to be frequently forgotten or ignored (dual-use). Since not much research has been conducted in Germany on the potential deployment of autonomous driving development steps into military domains, 25 semi-structured interviews with de-velopers and researchers and actors involved in the field, were conducted in 2020. The paper identifies that the majority of re-spondents interviewed were aware of general existing dual-use de-bates, however, few had reflected about dual-use issues regarding a possible transfer of their own development processes in the con-text of autonomous driving to military applications, intensively. One reason is the small-scale nature of research, another is the complexity of the field, which enables the engineer’s alienation from their responsibility for the artefacts’ use. Moreover, it has become clear that hardly any conversations among colleagues oc-cur about possible misuse and that no standardized policy guide-lines exist, which provide information about possible risk. To raise dual-use awareness, scientific contributions, risk education, and interdisciplinary discussions are essential.},
language = {en},
number = {3},
journal = {IEEE Transactions on Technology and Society},
author = {Schwartz, Sebastian and Guntrum, Laura and Reuter, Christian},
year = {2022},
keywords = {Selected, A-Paper, Ranking-ImpactFactor, Peace, AuswahlPeace, Projekt-ATHENE-FANCY, Projekt-TraCe},
pages = {163--174},
}
[BibTeX] [Abstract] [Download PDF]
The European Union (EU) has undertaken policies which address the research and development of artificial intelligence (AI). In light of debates of technology assessment which focus on risks for humans and questions of control of AI, the EU has propagated an ethical, human-centred approach of the application of AI. It is important to identify how the EU envisions AI as this may guide emerging norms in AI governance and today’s research and development of (weaponised) AI. Building on works of Human-Computer Interaction (HCI), this work derives the actor’s understanding of human-AI interaction, including conceptualisations of explainability, interpretability, and risks. Analysis of EU documents on the implementation of AI as a general-purpose technology and for military application reveals that explainability and risk identification are crucial elements for trust, which itself is a necessary component in the uptake of AI. Interdisciplinary approaches allow for a more detailed understanding of actors’ fundamental views on human control of AI, which further contributes to debates on technology assessment in professionalised political contexts.
@article{schmidTrustworthyExplainableEuropean2022,
title = {Trustworthy and {Explainable}: {A} {European} {Vision} of ({Weaponised}) {Artificial} {Intelligence}},
volume = {95},
url = {https://elibrary.bwv-verlag.de/article/10.35998/fw-2022-0013},
doi = {10.35998/fw-2022-0013},
abstract = {The European Union (EU) has undertaken policies which address the research and development of artificial intelligence (AI). In light of debates of technology assessment which focus on risks for humans and questions of control of AI, the EU has propagated an ethical, human-centred approach of the application of AI. It is important to identify how the EU envisions AI as this may guide emerging norms in AI governance and today’s research and development of (weaponised) AI. Building on works of Human-Computer Interaction (HCI), this work derives the actor’s understanding of human-AI interaction, including conceptualisations of explainability, interpretability, and risks. Analysis of EU documents on the implementation of AI as a general-purpose technology and for military application reveals that explainability and risk identification are crucial elements for trust, which itself is a necessary component in the uptake of AI. Interdisciplinary approaches allow for a more detailed understanding of actors’ fundamental views on human control of AI, which further contributes to debates on technology assessment in professionalised political contexts.},
number = {3-4},
journal = {Die Friedens-Warte / Journal of International Peace and Organization (JIPO)},
author = {Schmid, Stefka},
year = {2022},
keywords = {Peace, Projekt-ATHENE-SecUrban, Projekt-TraCe},
pages = {290--315},
}
[BibTeX] [Abstract] [Download PDF]
Not only since the COVID-19 pandemic, many research processes had already been increasingly digitized to maintain global ex-change of information efficiently. For years, scientific empirical studies have been conducted in politically sensitive contexts using digitally mediated methods, entailing numerous risks as well as potentials. One goal of digital research is to also capture marginal-ized voices. With emerging risks related to digital research, such as digital surveillance and social media monitoring by adversaries (e.g., the military in Myanmar), research needs to be more thoughtfully conducted. Considering research ethics, an evolving discrepancy between security measures and values of social jus-tice, such as accessibility and representation, appears as most data-secure applications are not used widely and offers such as “Free Basics” entice people to use rather data-unsecure applica-tions. Reflecting on this existing discrepancy in ethical require-ments, I illustrate challenges of the German research context re-lated to digitally conducted research focusing on overt conflictive social contexts.
@inproceedings{guntrumJusticeorientedResearchPeace2022,
address = {Darmstadt},
series = {Mensch und {Computer} 2022 - {Workshopband}},
title = {Justice-oriented {Research} in {Peace} and {Conflict} {Studies} in {Times} of {Social} {Distancing}},
url = {https://dl.gi.de/handle/20.500.12116/39092},
doi = {10.18420/muc2022-mci-ws10-216},
abstract = {Not only since the COVID-19 pandemic, many research processes had already been increasingly digitized to maintain global ex-change of information efficiently. For years, scientific empirical studies have been conducted in politically sensitive contexts using digitally mediated methods, entailing numerous risks as well as potentials. One goal of digital research is to also capture marginal-ized voices. With emerging risks related to digital research, such as digital surveillance and social media monitoring by adversaries (e.g., the military in Myanmar), research needs to be more thoughtfully conducted. Considering research ethics, an evolving discrepancy between security measures and values of social jus-tice, such as accessibility and representation, appears as most data-secure applications are not used widely and offers such as “Free Basics” entice people to use rather data-unsecure applica-tions. Reflecting on this existing discrepancy in ethical require-ments, I illustrate challenges of the German research context re-lated to digitally conducted research focusing on overt conflictive social contexts.},
language = {en},
booktitle = {Mensch und {Computer} - {Workshopband}},
publisher = {Gesellschaft für Informatik},
author = {Guntrum, Laura},
year = {2022},
keywords = {Security, Peace, Projekt-ATHENE-FANCY, Projekt-TraCe},
}
[BibTeX] [Abstract] [Download PDF]
Journalists and ethnographic researchers, such as anthropologists, sociologists or media scholars, have comparable ways of establishing initial contacts with people from their fields of interest. Due to the ongoing COVID-19 pandemic and consequential travel restrictions and social distancing, it has become increasingly difficult to access a field. Taking inspiration from social anthropologist Ulf Hannerz (2004, p. 226), who compared journalists and anthropologists as “neighboring groups engaged in a somehow parallel pursuit,” this article explores what researchers may learn from practitioners who conduct research without being on-site. Fed by various practical journalists’ experiences, the article aims to investigate how information and communication technologies (ICTs) and digitally mediated methods, such as online search tools and social media, can be used to establish contacts and gain trust remotely. Here, the relevance of these methods for accessing a field in general goes beyond the limitations imposed during the COVID-19 pandemic and can be of interest to all those who face difficulties of field access of any kind. Ultimately, this article reflects on corresponding ethical challenges that may arise while conducting research remotely.
@article{guntrumRemotelyAccessingField2022,
title = {Remotely {Accessing} the {Field} and {Building} {Trust} with {Distant} {Sources}. {Perspectives} from {Journalism} {Practice} for {Ethnographic} {Research}},
volume = {12},
url = {https://globalmediajournal.de/index.php/gmj/article/view/220},
abstract = {Journalists and ethnographic researchers, such as anthropologists, sociologists or media scholars, have comparable ways of establishing initial contacts with people from their fields of interest. Due to the ongoing COVID-19 pandemic and consequential travel restrictions and social distancing, it has become increasingly difficult to access a field. Taking inspiration from social anthropologist Ulf Hannerz (2004, p. 226), who compared journalists and anthropologists as “neighboring groups engaged in a somehow parallel pursuit,” this article explores what researchers may learn from practitioners who conduct research without being on-site. Fed by various practical journalists’ experiences, the article aims to investigate how information and communication technologies (ICTs) and digitally mediated methods, such as online search tools and social media, can be used to establish contacts and gain trust remotely. Here, the relevance of these methods for accessing a field in general goes beyond the limitations imposed during the COVID-19 pandemic and can be of interest to all those who face difficulties of field access of any kind. Ultimately, this article reflects on corresponding ethical challenges that may arise while conducting research remotely.},
number = {1},
journal = {Global Media Journal - German Edition},
author = {Guntrum, Laura and Keßler, Mira and Patel, Jignesh and Varfolomeeva, Anna},
year = {2022},
keywords = {Peace, Projekt-TraCe},
}
Further Information: https://www.trace-center.de/