Abstract
Advances in science and technology play a crucial role in the context of peace, conflict and security. As information technology (IT) is becoming omnipresent, this includes both the resilience of IT infrastructures e.g. as a target in cases of conflict and the role of IT applications to prevent and manage conflicts, crises and disasters. This chapter is an introduction to IT and its role in war and peace, in conflicts and crises as well as in safety and security. Based on those connections a new field of research has emerged: IT peace research. It is introduced in this chapter which provides an overview of the interdisciplinary concepts of peace, conflict and security. In addition, the research disciplines computer science and peace and conflict studies as the basis of IT peace research are explained. Moreover, the chapter focuses on the specific research topics of IT peace research and presents the institutionalised research landscape in Germany.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Recommended Reading
Altmann, J. (2017). Einführung. In J. Altmann, U. Bernhardt, K. Nixdorff, I. Ruhmann, & D. Wöhrle (Eds.), Naturwissenschaft – Rüstung – Frieden. Basiswissen für die Friedensforschung (pp. 1–7). Wiesbaden: Springer VS.
Bibliography
Altmann, J. (2017). Einführung. In J. Altmann, U. Bernhardt, K. Nixdorff, I. Ruhmann, & D. Wöhrle (Eds.), Naturwissenschaft – Rüstung – Frieden. Basiswissen für die Friedensforschung (pp. 1–7). Wiesbaden: Springer VS.
Altmann, J., Kalinowski, M., Kronfeld-Goharani, U., Liebert, W., & Neuneck, G. (2010). Naturwissenschaft, Krieg und Frieden. In P. Schlotter & S. Wisotzki (Eds.), Friedens- und Konfliktforschung (pp. 410–445). Baden-Baden: Nomos. https://doi.org/10.1007/978-3-531-92009-2
Altmann, J., & Sauer, F. (2017). Autonomous Weapon Systems and Strategic Stability. Survival: Global Politics and Strategy, 59(5), 117–142. https://doi.org/10.1080/00396338.2017.1375263
Alwardt, C., Brzoska, M., Ehrhart, H.-G., Kahl, M., Neuneck, G., Schmid, J., & Schneider, P. (2013). Braucht Deutschland Kampfdrohnen? Hamburger Informationen Zur Friedensforschung Und Sicherheitspolitik, 50, 1–12.
Arquilla, J., & Ronfeldt, D. (1993). Cyberwar is Coming. RAND Corporation.
Bernhardt, U., & Ruhmann, I. (2017). Informatik. In J. Altmann, U. Bernhardt, K. Nixdorff, I. Ruhmann, & D. Wöhrle (Eds.), Naturwissenschaft – Rüstung – Frieden (pp. 337–448). https://doi.org/10.1007/978-3-658-01974-7
BMVg. (2016). Abschlussbericht Aufbaustab Cyber- und Informationsraum. http://docs.dpaq.de/11361-abschlussbericht_aufbaustab_cir.pdf
Bonacker, T. (2011). Forschung für oder Forschung über den Frieden? Zum Selbstverständnis der Friedens-und Konfliktforschung. In P. Schlotter & S. Wisotzki (Eds.), Friedens- und Konfliktforschung (pp. 46–78). Baden-Baden: Nomos.
Booth, K. (2014). Global Security. In M. Kaldor & I. Rangelov (Eds.), The Handbook of Global Security Policy (pp. 11–30). Wiley.
Boulanin, V., & Verbruggen, M. (2017). Mapping the development of autonomy in weapon systems. https://doi.org/10.13140/RG.2.2.22719.41127
Boulding, K. E. (1963). Is Peace Researchable? Background, 6(4), 70–77.
Bovet, A., & Makse, H. A. (2019). Influence of fake news in Twitter during the 2016 US presidential election. Nature Communications, 10(7), 1–23.
Buchanan, B. (2016). The Cybersecurity Dilemma. London: C. Hurst & Co.
Bundesamt für Sicherheit in der Informationstechnik. (2013). IT-Grundschutz: Glossar und Begriffsdefinitionen. Retrieved from https://www.bsi.bund.de/DE/Themen/ITGrundschutz/ITGrundschutzKataloge/Inhalt/Glossar/glossar_node.html
Bundesamt für Sicherheit in der Informationstechnik. (2016). Die Lage der IT-Sicherheit in Deutschland 2016. https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/Lageberichte/Lagebericht2016.pdf?__blob=publicationFile&v=5
Bundesamt für Sicherheit in der Informationstechnik. (2017). Cyber-Sicherheit. Retrieved from https://www.bsi.bund.de/DE/Themen/Cyber-Sicherheit/cyber-sicherheit_node.html
Campbell, P. J., MacKinnon, A. S., & Stevens, C. (2010). An Introduction to Global Studies. Wiley-Blackwell.
Caughley, T. (2016). Nuclear Disarmament Verification: Survey of Verification Mechanisms. http://www.unidir.org/files/publications/pdfs/survey-of-verification-mechanisms-en-657.pdf
Chivvis, C. S., & Dion-Schwarz, C. (2017). Why It’s So Hard to Stop a Cyberattack - and Even Harder to Fight Back. https://www.rand.org/blog/2017/03/why-its-so-hard-to-stop-a-cyberattack-and-evenharder.html
Davis, J. S. I., Boudreaux, B., Welburn, J. W., Ogletree, C., McGovern, G., & Chase, M. S. (2017). Stateless Attribution: Toward International Accountability in Cyberspace. RAND Corporation
Deutscher Bundestag. (2017). Fake-News: Definition und Rechtslage. https://www.bundestag.de/blob/502158/99feb7f3b7fd1721ab4ea631d8779247/wd-10-003-17-pdf-data.pdf
Federal Ministry of the Interior. (2011). Cyber Security Strategy for Germany. Retrieved from https://www.cio.bund.de/SharedDocs/Publikationen/DE/Strategische-Themen/css_engl_download.pdf?__blob=publicationFile
Federath, H. (2017). Einführung in die IT-Sicherheit. Retrieved from https://svs.informatik.uni-hamburg.de/teaching/gss-10einfsi.pdf
Ferrara, E., Varol, O., Davis, C., Menczer, F., & Flammini, A. (2016). The Rise of Social Bots. Communications of the ACM, 59(7), 96–104.
FIfF. (n.d.). Forum InformatikerInnen für Frieden und gesellschaftliche Verantwortung e.V. - Wir über uns. https://www.fiff.de/about
FONAS. (n.d.). Forschungsverbund Naturwissenschaft, Abrüstung und internationale Sicherheit. http://www.fonas.org/fonas/kurzbeschreibung/
FONAS. (2015). Forschungsmemorandum - Naturwissenschaftliche Friedensforschung in Deutschland - Eine neue Förderinitiative ist dringend nötig. Retrieved from http://fonas.org/pressemitteilung/FONAS_Forschungsmemorandum_Nov_2015.pdf
Ford, C. A. (2010). The Trouble with Cyber Arms Control. The New Atlantis, (29), 52–67.
Forge, J. (2010). A note on the definition of “dual use.” Science and Engineering Ethics, 16(1), 111–118. https://doi.org/10.1007/s11948-009-9159-9
Franke, U. E. (2017). Die Revolution in Militärischen Angelegenheiten. In T. Ide (Ed.), Friedens- und Konfliktforschung (pp. 69–92). Opladen, Berlin, Toronto: Verlag Barabara Budrich.
Freiling, F., Grimm, R., Großpietsch, K.-E., Keller, H. B., Mottok, J., Münch, I., … Saglietti, F. (2014). Technische Sicherheit und Informationssicherheit. Informatik-Spektrum, 37(1), 14–24. https://doi.org/10.1007/s00287-013-0748-2
Galtung, J. (1969). Violence, Peace, and Peace Research. Journal of Peace Research, 6(3), 167–191.
Gandhi, R., Sharma, A., Mahoney, W., Sousan, W., Zhu, Q., & Laplante, P. (2011). Dimensions of Cyber-Attacks. IEEE Technology and Society Magazine, 28–38.
Gleditsch, N. P., Nordkvelle, J., & Strand, H. (2014). Peace research - Just the study of war? Journal of Peace Research, 51(2), 145–158. https://doi.org/10.1177/0022343313514074
Gruber, T. (2015). Die Informatik in der modernen Kriegsführung. FIfF-Kommunikation “Rüstung Und Informatik,” 3, 39–41.
Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber security, and the copenhagen school. International Studies Quarterly, 53(4), 1155–1175. https://doi.org/10.1111/j.1468-2478.2009.00572.x
Hourcade, J. P., & Bullock-Rest, N. E. (2011). HCI for Peace: A Call for Constructive Action. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI) (pp. 443–452). New York, USA: ACM Press. https://doi.org/10.1145/1978942.1979005
Hourcade, J. P., & Nathan, L. (2013). Human computation and conflict. In P. Michelucci (Ed.), Human Computation and Conflict (pp. 1–17). New York: Springer.
Hügel, S. (2017). Forum InformatikerInnen für Frieden und gesellschaftliche Verantwortung e.V. https://www.fiff.de/
IAEA. (2018). IAEA Safeguards Overview. Retrieved from https://www.iaea.org/publications/factsheets/iaea-safeguards-overview
ICT4Peace Foundation. (2017). Perspectives on Responsible Behavior in State Uses of ICTs. ICT for peace. https://ict4peace.org/wp-content/uploads/2017/02/ICT4Peace-Book-Draft.pdf
ISO 27001. (2015). Informationstechnik - IT-Sicherheitsverfahren - Informationssicherheits-Managementsysteme - Anforderungen (ISO/IEC 27001:2013 + Cor. 1:2014).
Koppe, K. (2010). Zur Geschichte der Friedens- und Konfliktforschung im 20. Jahrhundert. In P. Imbusch & R. Zoll (Eds.), Friedens- und Konfliktforschung. Eine Einführung (pp. 17–66). Wiesbaden: VS Verlag für Sozialwissenschaften.
Lange, S. (2004). Netzwerk-basierte Operationsführung (NBO). Streitkräfte-Transformation im Informationszeitalter. Berlin.
Mansfield-Devine, S. (2009). Darknets. Computer Fraud & Security, 2009(12), 4–6. https://doi.org/10.1016/S1361-3723(09)70150-2
Mascolo, G., Steinke, R., & Tanriverdi, H. (2018, March). Die Geschichte eines Cyber-Angriffs. Süddeutsche Zeitung.
Müller, H. (2003). Begriff, Theorien und Praxis des Friedens. In G. Hellmann, K. D. Wolf, & M. Zürn (Eds.), Die neuen Internationalen Beziehungen. Forschungsstand und Perspektiven in Deutschland (pp. 209–250). Baden-Baden: Nomos Verlagsgesellschaft.
Nakashima, E., & Warrick, J. (2012). Stuxnet Was Work of U.S. and Israeli Experts, Officials Say. Washington Post.
NATO. Warsaw Summit Communiqué (2016). https://www.nato.int/cps/en/natohq/official_texts_133169.htm
Neuneck, G. (2017). Krieg im Internet? Cyberwar in ethischer Reflexion. In I.-J. Werkner & K. Ebeling (Eds.), Handbuch Friedensethik (pp. 805–816). Wiesbaden. https://doi.org/10.1007/978-3-658-14686-3_58
Reinhold, T. (2018). Hack der deutschen Regierungsnetze. https://cyber-peace.org/cyberpeace-cyberwar/relevante-cybervorfalle/hack-der-deutschen-regierungsnetze/
Reuter, C., & Kaufhold, M.-A. (2018). Usable Safety Engineering sicherheitskritischer interaktiver Systeme. In C. Reuter (Ed.), Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement (pp. 19–40). Wiesbaden, Germany: Springer Vieweg.
Rid, T. (2012). Cyber War Will Not Take Place. Journal of Strategic Studies, 35(1), 5–32. https://doi.org/10.1080/01402390.2011.608939
Rousseau, J.-J. (1972). Du contrat social ou principes du droit politique (Bibliothè). Bruxelles: Bordas.
Sanger, D. E. (2014). Syria War Stirs New U.S. Debate on Cyberattacks. New York Times.
Sarkees, M. R. (2000). The Correlates of War Data on War: an Update to 1997. Conflict Management and Peace Science, 18(1), 123–144.
Sauer, F., & Schörnig, N. (2012). Killer drones: The “silver bullet” of democratic warfare? Security Dialogue, 43(4), 363–380. https://doi.org/10.1177/0967010612450207
Schmitt, M. (2013). Tallinn Manual on the International Law Applicable to Cyber Warfare. New York, NY: Cambridge University Press.
Shackelford, S. J. (2013). Toward Cyberpeace: Managing Cyberattacks through Polycentric Governance. American University Law Review, 62(5), 94.
Stauffacher, D., Drake, W., Currion, P., & Steinberger, J. (2005). Information and Communication Technology for Peace. New York: The United Nations Information and Communication Technologies Task Force.
Uppsala University, D. of P. and C. R. (insitution). (2017). Uppsala Conflict Data Program Conflict Encyclopedia (UCDP database).
US Department of Defense. (1998). Information Warfare Policy (CJCS 3210.01).
US DoD. (2011). Strategy for Operating in Cyberspace. https://csrc.nist.gov/CSRC/media/Projects/ISPAB/documents/DOD-Strategy-for-Operating-in-Cyberspace.pdf
von Clausewitz, C. (2005). Vom Kriege. Frankfurt am Main: Insel-Verlag.
von Solms, R., & van Niekerk, J. (2013). From information security to cyber security. Computers and Security, 38, 97–102. https://doi.org/10.1016/j.cose.2013.04.004
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Fachmedien Wiesbaden GmbH, ein Teil von Springer Nature
About this chapter
Cite this chapter
Reuter, C., Aldehoff, L., Riebe, T., Kaufhold, MA. (2019). IT in Peace, Conflict, and Security Research. In: Reuter, C. (eds) Information Technology for Peace and Security. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-25652-4_2
Download citation
DOI: https://doi.org/10.1007/978-3-658-25652-4_2
Published:
Publisher Name: Springer Vieweg, Wiesbaden
Print ISBN: 978-3-658-25651-7
Online ISBN: 978-3-658-25652-4
eBook Packages: Computer Science and Engineering (German Language)