scispace - formally typeset
Search or ask a question
Author

Larissa Aldehoff

Bio: Larissa Aldehoff is an academic researcher from Technische Universität Darmstadt. The author has contributed to research in topics: Peace and conflict studies & Resilience (organizational). The author has an hindex of 3, co-authored 4 publications receiving 16 citations.

Papers
More filters
01 Jan 2019
TL;DR: This survey of 1,024 German inhabitants is the first empirical study on people’s views on social media monitoring and surveillance in crisis management and finds the willingness to share data during an imminent threat depends mostly on the type of data.
Abstract: Social media is used during crises and disasters by state authorities and citizens to communicate and provide, gain and analyze information. Monitoring of platforms in such cases is both a well-established practice and a research area. The question, whether people are willing to renounce privacy in social media during critical incidents, or even allow surveillance in order to contribute to public security, remains unanswered. Our survey of 1,024 German inhabitants is the first empirical study on people’s views on social media monitoring and surveillance in crisis management. We find the willingness to share data during an imminent threat depends mostly on the type of data: a majority (63% and 67%, respectively) would give access to addresses and telephone numbers, whereas the willingness to share content of chats or telephone calls is significantly lower (27%). Our analysis reveals diverging opinions among participants and some effects of sociodemographic variables on the acceptance of invasions into privacy.

6 citations

Book ChapterDOI
01 Jan 2019
TL;DR: In Dezember 2017, Reinhold et al. as discussed by the authors found an invasion of deutschen Regierungsnetzwerks entdeckt; this invasion vernetzt Bundesministerien und Behorden (vgl. Reinhold 2018a).
Abstract: Im Dezember 2017 wurde eine Invasion des deutschen Regierungsnetzwerks entdeckt; dieses vernetzt Bundesministerien und Behorden (vgl. Reinhold 2018a). Die Angreifer nutzten das Intranet der Hochschule des Bundes fur offentliche Verwaltung und der Bundesakademie fur offentliche Verwaltung als Einfallstor. Dieses ist der am wenigsten gesicherte Teil des Systems, da externe Teilnehmerinnen und Teilnehmer auch auserhalb der Einrichtung darauf zugreifen mussen, beispielsweise fur Fortbildungen des Auswartigen Amtes.

5 citations

Book ChapterDOI
01 Jan 2019
TL;DR: This chapter is an introduction to IT and its role in war and peace, in conflicts and crises as well as in safety and security and presents the institutionalised research landscape in Germany.
Abstract: Advances in science and technology play a crucial role in the context of peace, conflict and security. As information technology (IT) is becoming omnipresent, this includes both the resilience of IT infrastructures e.g. as a target in cases of conflict and the role of IT applications to prevent and manage conflicts, crises and disasters. This chapter is an introduction to IT and its role in war and peace, in conflicts and crises as well as in safety and security. Based on those connections a new field of research has emerged: IT peace research. It is introduced in this chapter which provides an overview of the interdisciplinary concepts of peace, conflict and security. In addition, the research disciplines computer science and peace and conflict studies as the basis of IT peace research are explained. Moreover, the chapter focuses on the specific research topics of IT peace research and presents the institutionalised research landscape in Germany.

4 citations

Book ChapterDOI
01 Jan 2019
TL;DR: An outlook based on fundamentals, cyber conflicts and war, cyber peace, cyber arms control, infrastructures as well as social interaction is given.
Abstract: Not only today, but also in the future information technology and the advances in the field of computer science will have a high relevance for peace and security. Naturally, a textbook like this can only cover a selective part of research and a certain point in time. Nonetheless, it can be attempted to identify trends, challenges and venture an outlook into the future. That is exactly what we want to achieve in this chapter: To predict future developments and try to classify them correctly. These considerations were made both by the editor and the authors involved alike. Therefore, an outlook based on fundamentals, cyber conflicts and war, cyber peace, cyber arms control, infrastructures as well as social interaction is given.

2 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This special issue presents selected contributions based on discussions at the conference SCIENCE · PEACE · SECURITY ’19, focusing on problems of international security and peace­building as well as contributions dedicated to transparency, trust­building, arms control, disarmament, and conflict management.
Abstract: Scientific discoveries and technological innovations have always exerted a great influence on peace and security. New civil and military technologies are revolutionizing warfare. Particularly striking areas are cyber warfare and the rapid development of uninhabited weapon systems. Issues of nuclear disarmament, missile defence or space armament as well as chemical and biological weapons remain urgent. The conference SCIENCE · PEACE · SECURITY ’19 aimed for an accurate understanding and fruitful discussions of today’s and tomorrow’s peace and security challenges. This includes natural science/technical as well as interdisciplinary contributions, focusing on problems of international security and peace­building as well as contributions dedicated to transparency, trust­building, arms control, disarmament, and conflict management. This special issue presents selected contributions based on discussions at the conference.

25 citations

Journal ArticleDOI
TL;DR: Wang et al. as discussed by the authors used dual process theory from psychology to clarify the causal impact of online media on trust in government in the context of terrorism crisis and empirically tested the effect of the online media with micro-level empirical evidence.
Abstract: Trust in government during crisis plays a key role in effective response and maintained resilience In recent years, online media, including social media platforms such as Weibo and WeChat and news media such as mobile news applications, have been widely adopted by the government in China for communication with the public to promote trust in government during crisis However, studies of the effect of online media on trust in government during crisis have yielded conflicting results This study (1) applies dual process theory from psychology to clarify the causal impact of online media on trust in government in the context of terrorism crisis and (2) empirically tests the effect of online media with microlevel empirical evidence We collected data from 713 local households in the X area of China, which has witnessed terrorist attacks, and applied an ordinal logistic regression model to determine the causal mechanism between online media and trust in government The study finds that exposure to terrorism-related information in online media has limited impact on trust in government during crisis Furthermore, sense of security positively moderates the relationship between exposure to terrorism-related information in online media and trust in government during crisis

24 citations

Journal ArticleDOI
01 Jan 2020
TL;DR: The need for further work in the area of research “IT peace research” is highlighted, which includes both empirical research on the role of IT in peace and security, as well as technical research to design technologies and applications.
Abstract: Advances in science and technology, including information technology (IT), play a crucial role in the context of peace and security. However, research on the intersection of peace and conflict research as well as computer science is not well established yet. This article highlights the need for further work in the area of research “IT peace research”, which includes both empirical research on the role of IT in peace and security, as well as technical research to design technologies and applications. Based on the elaboration of the disciplines, central challenges, such as insecurity, actors, attribution and laws, are outlined.

14 citations

Journal ArticleDOI
TL;DR: In this article, the authors describe spillover effects as the process of a company benefiting from the R&D activities of another one and thereby gaining an economic advantage, and propose an approach for measuring spillover effec...
Abstract: Spillover effects describe the process of a company benefiting from the R&D activities of another one and thereby gaining an economic advantage. One prominent approach for measuring spillover effec...

13 citations

Book ChapterDOI
01 Jan 2019
TL;DR: This textbook offers an introduction to peace, conflict, and security research, thereby focusing on natural science, technical and computer science perspectives, and sheds light on fundamentals and culture and interaction before an outlook is given.
Abstract: Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and security. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural science, technical and computer science perspectives. In the following, it sheds light on fundamentals (e.g. IT in peace, conflict and security, naturalscience/ technical peace research), cyber conflicts and war (e.g. information warfare, cyber espionage, cyber defence, Darknet), cyber peace (e.g. dual-use, technology assessment, confidence and security building measures), cyber arms control (e.g. arms control in the cyberspace, unmanned systems, verification), cyber attribution and infrastructures (e.g. attribution of cyber attacks, resilient infrastructures, secure critical information infrastructures), culture and interaction (e.g. safety and security, cultural violence, social media), before an outlook is given. This chapter provides an overview of all chapters in this book.

10 citations