References PRIF Spotlight 02/2024
Spotlight 02/24: Beyond the Code. Unveiling Gender Dynamics in AI and Cybersecurity for International Security
by Anna-Katharina Ferl, Clara Perras | To the Publication
1 https://www.politico.com/news/2022/06/17/abortion-rights-advocates-digital-security-threats-00040654.
2 Strand, Cecilia and Jakob Svensson (2021) Disinformation campaigns about LGBTI+ people in the EU and foreign influence. Briefing European Parliament, https://www.europarl.europa.eu/RegData/etudes/BRIE/2021/653644/EXPO_BRI(2021)653644_EN.pdf.
3 Judson, Ellen (2021). Gendered disinformation: 6 reasons why liberal democracies need to respond to this threat. Policy Brief, Heinrich Böll Stiftung, https://eu.boell.org/en/2021/07/09/gendered-disinformation-6-reasons-why-liberal-democracies-need-respond-threat.
4 https://time.com/5520558/artificial-intelligence-racial-gender-bias/.
5 www.iks.fraunhofer.de/de/themen/kuenstliche-intelligenz.html.
6 Crenshaw, K. (1991). Mapping the Margins: Intersectionality, Identity Politics, and Violence against Women of Color. Stanford Law Review, 43(6), 1241–1299. https://doi.org/10.2307/1229039.
7 A great overview of the challenges of the increasing integration of AI into the military can be found in the edited volume by Reinhold, Thomas; Schörnig, Niklas (2022) Armament, Arms Control and Artificial Intelligence. The Janus-faced Nature of Machine Learning in the Military Realm, Springer: Cham.
8 Hessmann Dalaqua, Renata; Egeland Kjolv; Graff Hugo, Torbjorn (2019) Still behind the curve. Gender balance in arms control, non-proliferation and disarmament diplomacy, UNIDIR, Geneva.
9 unidir.org/wp-content/uploads/2023/05/Gender-in-Cyber-Diplomacy_Factsheet.pdf.
10 www.justsecurity.org/10424/women-autonomous-weapons/.
11 https://friedensgutachten.de/user/pages/04.archiv/2022/02.ausgabe/06.nachhaltiger-frieden/FGA2022_Kapitel%202.pdf; True, Jacqui. 2020. „Continuums of Violence and Peace: A Feminist Perspective“. Ethics & International Affairs 34(1): 85–95. doi:10.1017/S0892679420000064
12 Millar, K., J. Shires, und T. Tropina (2021) Gender Approaches to Cyber-security: Design, Defence and Response. Genf: UNIDIR.
13 Cohn, C. (1987) Sex and Death in the Rational World of Defense Intellectuals. Signs, 12(4), 687–718.
14 Millar, Katharine, James Shires, und Tatiana Tropina. 2021. Gender Approaches to Cybersecurity: Design, Defence and Response. The United Nations Institute for Disarmament Research. doi:10.37559/GEN/21/01, Brown, Deborah, und Allison Pytlak. 2020. Why Gender Matters in International Security. WILPF/APC. https://reachingcriticalwill.org/images/documents/Publications/gender-cybersecurity.pdf.
16 blog.gitnux.com/cybersecurity-diversity-statistics/.
17 www.turing.ac.uk/sites/default/files/2021-03/where-are-the-women_public-policy_full-report.pdf.
18 eige.europa.eu/sites/default/files/cyber_violence_against_women_and_girls_key_terms_and_concepts.pdf.
19 www.e-ir.info/2022/09/18/interview-julia-slupska/.
21 www.nytimes.com/2019/08/16/technology/ai-humans.html.
22 World Economic Forum (2023) Global Gender Gap Report, p. 46: www3.weforum.org/docs/WEF_GGGR_2023.pdf.
23 ssir.org/articles/entry/when_good_algorithms_go_sexist_why_and_how_to_advance_ai_gender_equity.
24 www.nytimes.com/2019/11/19/technology/artificial-intelligence-bias.html.
25 Chandler, Katherine (2021) Does Military AI Have Gender? Understanding bias and promoting ethical approaches in military applications of AI, UNIDIR, Geneva, p. 8.
26 Slupska, Julia, Safe at Home: Towards a Feminist Critique of Cybersecurity (May 1, 2019). St. Anthony's International Review 2019 no. 15: Whose Security is Cybersecurity? Authority, Responsibility and Power in Cyberspace, Available at SSRN: ssrn.com/abstract=3429851.
27 https://wiisglobal.org/deepfakes-as-a-security-issue-why-gender-matters/.
28 Privacy International. 2019. From Oppression to Liberation: Reclaiming the Right to Privacy. United Kingdom: Privacy Internationl. https://www.privacyinternational.org/sites/default/files/2018-11/From%20oppression%20to%20liberation-reclaiming%20the%20right%20to%20privacy.pdf.
29 www.article19.org/apps-arrests-abuse-egypt-lebanon-iran/..
30 www.article19.org/apps-arrests-abuse-egypt-lebanon-iran/.