Document type: Miscellaneous
Source: weforum
Abstract: While the 2024 edition of the Global Cybersecurity Outlook highlighted the growing inequity in cyberspace, this year’s report shines a light on the increasing complexity of the cyber landscape, which has profound and far-reaching implications for organizations and nations.
DOI: not defined
ISBN: not defined
ISSN: not defined
Notes: not defined
Author: not defined
Year: 2025
Document type: Journal Article
Source: Oxford University Press (OUP)
Abstract: Using the Canadian research and policy context as case study, this paper will first, examine the governance mechanisms currently in place to mitigate the negative implications of dual-use research and innovation; second, compare these with other relevant international governance contexts; and finally, propose some ways forward (i.e. a risk analysis approach) for developing more robust governance mechanisms.
DOI: 10.1093/scipol/sct038
ISBN: not defined
ISSN: 0302-3427
Notes: National and international organisations have implemented governance mechanisms to address a diversity of ethical, security and policy challenges raised by advances in research and innovation. These challenges become particularly complex when research or innovations are considered ‘dual-use’, i.e. can lead to both beneficial and harmful uses, and in particular, civilian (peaceful) and military (hostile) applications. While many countries have mechanisms (i.e. export controls) to govern the transfer of dual-use technology (e.g. nuclear, cryptography), it is much less clear how dual-use research from across the range of academic disciplines can or should be governed.
Author: B. Williams-Jones, C. Olivier, E. Smith
Year: 2014
Document type: Journal Article
Source: SAGE Publications
Abstract: This article explores the emerging security governance of knowledgeable practices in life sciences and critically reflects on its possible implications. The article first contextualizes the current understanding of the dual-use dilemma in life sciences in prior discourse on science–security relations and argues that security concerns have converged with ethical dilemmas related to the governing of science. Drawing on critical theory, security studies and science studies, it then conceptualizes dual use as a problem of organizing circulations and suggests that policing scientific knowledge through the establishment of a ‘culture of responsibility’ can be understood as a part of broader shifts towards the subjectification of knowledge. Using examples from life sciences, the article analyses how practices of knowledge production and circulation are adjusted to the logic of security.
DOI: 10.1177/0967010616658848
ISBN: not defined
ISSN: 0967-0106
Notes: The article concludes that the converging political rationalities and governmental techniques of responsible science and security risk management, understood as an ‘ethicalization’ of security, affect the politicization of security expertise, prospects of resistance and the democratic accountability of science.
Author: Dagmar Rychnovská
Year: 2016
Document type: Miscellaneous
Source: sifisheriessciences
Abstract: Product Development of military and non-military become a must choice by defense industry to endure in facing challenge on need of unsustainable military product. If a defense industry only depends on production of military product, there is risk that defense industry will experience point of saturated. In overcoming the problem, the defense industry must own the function as Dual Use between defense sector and economy sector. Defense industry in increasing its independence uses the proposed strategy to reach the economy scale from its own manufactured products. This study aim to analyze the contribution opportunity of government strategy in supporting the development of military and non-military product (Dual Use Technology) on defense industry in Indonesia.
DOI: 10.17762/sfs.v10i2S.808
ISBN: not defined
ISSN: not defined
Notes: The type of research is analysis of qualitative descriptive through data collection techniques by using bibliography, observation as well as interview to a number of leader organizations in the Ministry of Defense, Ministry of Finance as well as some principal of Industrial State-Owned Enterprises Strategic (BUMNIS) in Indonesia, academics as well as experts on the field of research. Research results show that a need of governance performance improvements on financing internal defense, especially Domestic Loan and Foreign Loan as well proper policy of incentive fiscal in supporting economics scale in defense industry. Therefore, the writers conclude and provide possible suggestions that can be useful as material consideration for government strategy on developing dual use technology products in Indonesia.
Author: not defined
Year: 2023
Document type: Journal Article
Source: Informa UK Limited
Abstract: I explore reasons why existing defense has failed to prevent cyber attacks on critical infrastructure. I study one of the least studied notions of cyberspace behavior known as target distinction. Drawn from customary international law, the principle posits that states should tell their wartime targets between combatants and noncombatants and use force only toward military objects. States should not target critical infrastructure, like gas pipelines, because to do so harms civilian populations who use it. I investigate four issues that keeps the principle from preventing attacks on critical infrastructure. The first is its inability to capture the networked nature of critical infrastructure beyond the simple dual-use (military and cyber) purposes. The second defect is the interpretive confusion that the principle generates over the rules of engagement. The third problem is the omission from its coverage of actors other than nation states. By design, the principle condones cyber attacks by nonstate actors on infrastructure, or by those whose linkage to state sponsors cannot be legally established. Finally, the principle is prone to fail when hackers lack proper understanding of what it does and does not allow. © 2023 Informa UK Limited, trading as Taylor & Francis Group.
DOI: 10.1080/13600869.2022.2164462
ISBN: not defined
ISSN: 1360-0869
Notes: The analysis showed that cyber attacks on critical infrastructure are a multi-causal phenomenon. In so doing, it treated four ‘enablers’ of such attacks as if they were exogenous to the principle of target distinction – that is, as though they were independent of the interactions between them. In reality, they are interactive. As such, solutions to the problem of distinction would require a systemic reform of the enterprise across the whole sectors of critical infrastructure. The increasing number of breaches into the infrastructure indicates that past efforts to reform the system have proven largely ineffective. As important as the need for legal definitions of key languages, the international community seems to have given up on making real efforts to generate a set of concrete languages in international law for the reasons stated above. In the meantime, existing principles of cyberspace behavior remain stripped of binding power, and knowledge of how one can avoid wrong targets spreads among hackers only slowly, if at all. The problem exacerbates one in which there is little motive for private hackers to make such distinctions, reinforcing the fact that actors will only make such distinctions if they believe the targets will when choosing how to respond. This means that not just the principle itself must be reframed but that the ‘regime’ of target distinction needs to be reinvigorated in its entirety. With the policy stalemate at the international level, what individual states have done is to turn to national policies to make their defense robust on their own while trying to appear in line with other countries internationally to respect the international rules. As a result, the national responses have been uncoordinated outside the international norm discourse. Worse, the national responses have been inadequate in many cases to deal with the fundamentally international nature of digital attacks. On top of this pessimistic note, the problems get harder to solve over time due to its snowball effect. Years of successful hacks on critical infrastructure have made hackers accustomed to violating all kinds of norms. Some hackers keep on attacking critical infrastructure because they make light of whether their actions would break the norms and whether they would be held accountable. Victims have grown numb to repeated offenses. ‘Compounding the problem, shareholders easily forgive and forget corporate cybersecurity negligence.’ (DefenseOne 2021) More hacking groups have joined the bandwagon, reducing the marginal costs of their transgressions. Ultimately, a vicious cycle emerges in which the number of hackers increases, the harder it becomes for victims to track them, making it even easier for more hackers to do so. The act of hitting critical infrastructure has become too common to sustain media attention after each breach, spreading the sense of hopelessness across the society.
Author: Nori Katagiri
Year: 2023