Threat, vulnerability, values, and damage

Cyberattacks and cybersecurity as a subject of technology assessment

Authors

DOI:

https://doi.org/10.14512/tatup.29.1.11

Keywords:

cybersecurity, cyberattacks, critical infrastructures, resilience

Abstract

The annual monetary costs incurred worldwide by cyberattacks are growing steadily and are on a scale comparable to the budgets of entire countries. Cyberattacks affect individuals, businesses, public institutions, authorities, and governments; they affect an infrastructure without which modern societies can hardly function. But ensuring cybersecurity can lead to conflicts of interest. Technologies used to ensure the security and resilience of this infrastructure should therefore be a subject of technology assessment.

References

Bauer, Johannes; van Eeten, Michel (2009): Cybersecurity. Stakeholder incentives, externalities, and policy options. In: Telecommunications Policy 33 (10–11), S. 706–719.

Beck, Ulrich (1986): Risikogesellschaft. Auf dem Weg in eine andere Moderne. Frankfurt am Main: Suhrkamp.

Boulanin, Vincent (2013): Cybersecurity and the arms industry. In: SIPRI Yearbook 2013: Armaments, disarmament and international security, S. 218–226.

Brito, Jerry; Watkins, Tate (2011): Loving the cyber bomb? The dangers of threat inflation in cybersecurity policy. Mercatus Center, Georg Mason University, Working Paper No. 11–24. Online verfügbar unter https://www.mercatus.org/system/files/Loving-Cyber-Bomb-Brito-Watkins.pdf, zuletzt geprüft am 05. 02. 2020.

Copeland, Duncan; Mason, Richard; McKenney, James (1995): Sabre. The development of information-based competence and execution of information-based competition. In: IEEE Annals of the History of Computing 17 (3), S. 30–57.

CSIS – Center for Strategic and International Studies (2018): Economic impact of cybercrime – no slowing down. Online verfügbar unter https://www.mcafee.com/enterprise/en-us/assets/reports/restricted/rp-economic-impact-cybercrime.pdf, zuletzt geprüft am 05. 02. 2020.

Dunn Caveltry, Miriam (2014): Breaking the cyber-security dilemma. Aligning security needs and removing vulnerabilities. In: Science and Engineering Ethics 20 (3), S. 701–715.

Gerovitch, Slava (2004): From newspeak to cyberspeak. A History of Soviet cybernetics. Cambridge, MA: MIT Press.

Hoffman, Lance (1973): Security and privacy in computer systems. Los Angeles, CA: Melville Publications.

Jones, Nicola (2018): How to stop data centres from gobbling up the world’s electricity. Nature 561 (7722), S. 163–166.

Martin, James (1973): Security, accuracy, and privacy in computer systems. Englewood Cliffs: Prentice-Hall.

Odlyzko, Andrew (2019): Cybersecurity is not very important. Working Paper. Online verfügbar unter https://www.dtc.umn.edu/~odlyzko/doc/cyberinsecurity.pdf, zuletzt geprüft am 05. 02. 2020.

Redmond, Kent; Smith, Thomas (2000): From Whirlwind to MITRE. The R & D story of the SAGE air defense computer. Cambridge, MA: MIT Press.

Westin, Alan (1967): Privacy and freedom. New York: Atheneum.

Published

01.04.2020

How to Cite

1.
Weber K, Christen M, Herrmann D. Threat, vulnerability, values, and damage: Cyberattacks and cybersecurity as a subject of technology assessment. TATuP [Internet]. 2020 Apr. 1 [cited 2022 Dec. 5];29(1):11-5. Available from: https://www.tatup.de/index.php/tatup/article/view/6789

Most read articles by the same author(s)